• ☂️-@lemmy.ml
    link
    fedilink
    arrow-up
    3
    ·
    edit-2
    1 day ago

    my key point is that they can rely on these exploits/backdoors if you are resistant in using the commercial data harvesting software, and they need to find you for some reason.