• Monologue@lemmy.zip
      link
      fedilink
      English
      arrow-up
      0
      ·
      1 year ago

      no but i trust third party security audits and the freedom to do that. for my threat model this is fine.

      it is not a matter of if i did it or not, it is a matter of if i could do that.