Damus
Jameson Lopp · 1w
Nope, this is standard operating procedure for security researchers.