It’s interesting that WhatsApp was the source of this vulnerability. I suggest bouncing between different communications apps to really be most effective. Any other ideas/best-practices that you’ve used?
It’s interesting that WhatsApp was the source of this vulnerability. I suggest bouncing between different communications apps to really be most effective. Any other ideas/best-practices that you’ve used?