• dyc3@lemmy.world
    link
    fedilink
    arrow-up
    1
    ·
    1 month ago

    It’s interesting that the threat model also includes participants. They take into account that when a user leaves, it should be impossible for them to continue listening.