Post
This is the part I don’t understand, if they can be run locally, that no internet is needed for it to work, and assuming that there’s no backdoor in the software (that’s the big IF), how are they stealing data or spying?
0
0