Given the motivated, well-funded, well-staffed nature of many nations’ intelligence gathering divisions, it’s safe to assume anything you do on a computer with any kind of internet connection is probably available and ready to be analysed if/when you ever cross the threshold from potential target to target.
Given the motivated, well-funded, well-staffed nature of many nations’ intelligence gathering divisions, it’s safe to assume anything you do on a computer with any kind of internet connection is probably available and ready to be analysed if/when you ever cross the threshold from potential target to target.
Welp, time to invent my own language lol
Welcome to con-lang-ing