• Arthur Besse@lemmy.ml
        link
        fedilink
        arrow-up
        1
        ·
        1 year ago

        What stops them from being able to? They could actually infer a lot of the metadata just from the encrypted network traffic, without even looking inside the VMs at their execution state. But, they can also see inside, so they can keep the kind of logs (outside the VM) which Signal [says that they] wouldn’t.