• CameronDev@programming.dev
    link
    fedilink
    arrow-up
    3
    ·
    9 months ago

    If its properly E2E encrypted, as they claim their RCS implementation is, then hopefully no opportunity for keyword scanning. But my point was that even without direct keyword scanning, there is a lot of information that could be exploited.