• It’s not about metadata exchange, but metadata exposure.

    Two of those platforms use self-hosted node servers. Behind a VPN with multiple customers, this is virtually untraceable. And certainly far less easily traced than by giving away your cell phone number to a company.

    • TheAnonymouseJoker@lemmy.ml
      link
      fedilink
      arrow-up
      0
      arrow-down
      2
      ·
      1 year ago

      This is why I said it is for developers and users to decide what is acceptable. The sensitivity of what you are doing, and the required threat model, determines what elements are acceptable to leak.