• bndkt@lemm.ee
    link
    fedilink
    English
    arrow-up
    1
    ·
    8 hours ago

    You just have to infiltrate one end, e.g. the smartphone of one party