• janus2
    link
    71 year ago

    Good article. Gives examples of what Proton shared in 2 cases and how one could prevent that from happening if they needed to with their threat model