• underwire212@lemm.ee
    link
    fedilink
    arrow-up
    0
    ·
    3 days ago

    Right. The question is whether they can attach what they know to an identity. Depends on your threat model which goal you need to achieve.