• janus2@lemmy.sdf.org
    link
    fedilink
    arrow-up
    7
    ·
    1 year ago

    Good article. Gives examples of what Proton shared in 2 cases and how one could prevent that from happening if they needed to with their threat model