The flowchart is great! Can you do a separate article about what exactly end-to-end encryption means and why it's good or bad? Like, what are my risks for communicating what kind of stuff? Is there a rule of thumb about when something could get me in trouble or when it's likely I'll get doxxed or whatever?

Comment Liked by 3 users.