atyh atyh@atyh.net 9 months ago YOU figure out why demanding someones phone number, and attaching it to an application on a smartphone compromises opsec.