- cross-posted to:
- technology@lemmy.world
- technology@lemmy.world
- cross-posted to:
- technology@lemmy.world
- technology@lemmy.world
You must log in or register to comment.
Whenever law enforcement can scan your stuff to make sure it’s safe, it can also be exploited by corporations, data harvesters, industrial spies (from competitors in your industry), and malware bandits.
You can’t tell the software who the good guys are, only who the guys are who have keys.