this post was submitted on 08 Apr 2026
47 points (98.0% liked)

Privacy

4355 readers
75 users here now

Icon base by Lorc under CC BY 3.0 with modifications to add a gradient

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments

Aka infect target and read message after decrypt. No encrypt actually broke and no message actually intercept.