Replies (2)

τέχνη's avatar
τέχνη 2 years ago
With all the discussion on the security of encrypted content, device access is everything. Running your own relay will be best practice. This rocks