• CameronDev@programming.dev
      link
      fedilink
      arrow-up
      3
      ·
      1 year ago

      If its properly E2E encrypted, as they claim their RCS implementation is, then hopefully no opportunity for keyword scanning. But my point was that even without direct keyword scanning, there is a lot of information that could be exploited.