Comment by casenmgreen
4 months ago
As we've seen, if the information is retained, it will be used.
The only safe approach is for that information not to exist in the first place.
4 months ago
As we've seen, if the information is retained, it will be used.
The only safe approach is for that information not to exist in the first place.
No comments yet
Contribute on Hacker News ↗