• shameless
    link
    fedilink
    arrow-up
    7
    ·
    3 days ago

    Unless you’re given a decryption key and you have audited the source code to understand that you’re the only recipient of that decryption key. You should always assume that the vendor of such a service can decrypt your data if they wanted/have a reason to.