• Arthur Besse@lemmy.ml
      link
      fedilink
      arrow-up
      1
      ·
      1 year ago

      What stops them from being able to? They could actually infer a lot of the metadata just from the encrypted network traffic, without even looking inside the VMs at their execution state. But, they can also see inside, so they can keep the kind of logs (outside the VM) which Signal [says that they] wouldn’t.