• tburkhol@lemmy.world
    link
    fedilink
    arrow-up
    20
    ·
    16 hours ago

    Encrypt email with anyone who publishes a key. If “bad” emails are the only ones you encrypt, then that metadata can be used to raise suspicion of you and to trace your contacts.