Source: Hacker News
Article note: It's cute but... isn't the major threat model that makes these things a bad idea that an attacker could technically or legally obtains access to the logs, which is still there if its all local and open source?
Comments