• underwire212@lemm.ee
    link
    fedilink
    arrow-up
    3
    ·
    2 days ago

    Right. The question is whether they can attach what they know to an identity. Depends on your threat model which goal you need to achieve.