User avatar
flori_ava_star:~cursor_blinking made-with-estrogen @star@amazonawaws.com
4w
re: security questions @luna Fair. I thought that, for the purposes in which I intend the core of this protocol to be used in, the current threat model is sufficient. Other use cases can impose their own additional restrictions and guidelines.