Damus
BenAllenG · 29w
They were subpoenaed to log the IP of a user. So with everything on the Internet if you're threat model is at that level use tor