Technology ❯ Social Media ❯ Privacy ❯ User Features
The contact-matching design targets leak-prone address book uploads through mutual consent backed by cryptographic protections.