Read it before, seem normal. It mentions info about who contacts the user, and elsewhere something about IP and logs. But if there business operating model is true they have no keys they can decrypt with. If they do them proton is no different tjam google
Read it before, seem normal. It mentions info about who contacts the user, and elsewhere something about IP and logs. But if there business operating model is true they have no keys they can decrypt with. If they do them proton is no different tjam google