Replies (1)

YOU figure out why demanding someones phone number, and attaching it to an application on a smartphone compromises opsec.