Technology ❯Data Security ❯Encryption ❯Encrypted Device Log
Technique Used to Identify Users, Raising Concerns Over Privacy and Activist Communications