• Uriel238 [all pronouns]@lemmy.blahaj.zone
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 year ago

    Whenever law enforcement can scan your stuff to make sure it’s safe, it can also be exploited by corporations, data harvesters, industrial spies (from competitors in your industry), and malware bandits.

    You can’t tell the software who the good guys are, only who the guys are who have keys.