A quick side-by-side look at how popular messaging apps stack up in open-source transparency, end-to-end encryption, and anonymity 😎👇
For #anonymity I consider the following: weak (phone # required), medium (email required), strong (no phone # or no email needed) #privacy #technology
Find a high-res pdf book with all my Linux and #cybersecurity related infographics from https://study-notes.org






