Technology ❯ Social Media ❯ Privacy ❯ Data Protection
The contact-matching design targets leak-prone address book uploads through mutual consent backed by cryptographic protections.