A thourough and scary analysis of what you can do with just metadata, applied to the hacking team leak.
A great case for mistrusting metadata storage by anyone.
A thourough and scary analysis of what you can do with just metadata, applied to the hacking team leak.
A great case for mistrusting metadata storage by anyone.