For people who are not equally sophisticated, you might as well assume that everything that you install there or communicate over there is actively being monitored. It is a safer assumption. That’s my assessment.

Keyboard shortcuts

j previous speech k next speech