Comment by NoImmatureAdHom
Comment by NoImmatureAdHom 8 hours ago
It's the backups. The backups aren't encrypted such that only the end-user has the key.
Comment by NoImmatureAdHom 8 hours ago
It's the backups. The backups aren't encrypted such that only the end-user has the key.