Replies (1)

It's hard to penetrate the users contact list, or the contact list of contacts. But there might be a cat and mouse game with implementation detail so encoding it in a nip would probably not be worth it so clients use different approaches.