← Back to context Comment by NoImmatureAdHom 4 hours ago It's the backups. The backups aren't encrypted such that only the end-user has the key. 0 comments NoImmatureAdHom Reply No comments yet Contribute on Hacker News ↗
No comments yet
Contribute on Hacker News ↗