Encrypt email with anyone who publishes a key. If “bad” emails are the only ones you encrypt, then that metadata can be used to raise suspicion of you and to trace your contacts.
Encrypt email with anyone who publishes a key. If “bad” emails are the only ones you encrypt, then that metadata can be used to raise suspicion of you and to trace your contacts.