• tburkhol@lemmy.world
    link
    fedilink
    arrow-up
    22
    ·
    1 day ago

    Encrypt email with anyone who publishes a key. If “bad” emails are the only ones you encrypt, then that metadata can be used to raise suspicion of you and to trace your contacts.