• @tburkhol
    link
    272 months ago

    Encrypt email with anyone who publishes a key. If “bad” emails are the only ones you encrypt, then that metadata can be used to raise suspicion of you and to trace your contacts.