• tburkhol@lemmy.world
    link
    fedilink
    arrow-up
    26
    ·
    6 days ago

    Encrypt email with anyone who publishes a key. If “bad” emails are the only ones you encrypt, then that metadata can be used to raise suspicion of you and to trace your contacts.