• dyc3@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    3 months ago

    It’s interesting that the threat model also includes participants. They take into account that when a user leaves, it should be impossible for them to continue listening.