• TheAnonymouseJoker@lemmy.ml
    link
    fedilink
    arrow-up
    0
    arrow-down
    2
    ·
    2 years ago

    This is why I said it is for developers and users to decide what is acceptable. The sensitivity of what you are doing, and the required threat model, determines what elements are acceptable to leak.