• underwire212@lemm.ee
    link
    fedilink
    arrow-up
    2
    ·
    5 days ago

    Right. The question is whether they can attach what they know to an identity. Depends on your threat model which goal you need to achieve.