Damus
BenAllenG profile picture
BenAllenG
They were subpoenaed to log the IP of a user. So with everything on the Internet if you're threat model is at that level use tor