@rickf @protonprivacy Wait this is not peer to peer? If it was then there would be no need to have a time limit since the network load is handled by the end devices
lx@swiss.social
@lx@swiss.social
Posts
-
Control your own future with a suite of business tools that don’t exploit your data. -
Control your own future with a suite of business tools that don’t exploit your data.@highfunctioningsociopath @protonprivacy That’s the same story like IMAP and SMTP. These protocols don’t allow for true E2E encryption.