jonah, 16 days ago @doomy how would @protonprivacy “un-hash” it if they needed to send you a recovery email? A hash is one way. All they can do is encrypt it (which I’m sure they do), but in that case they’ll have the keys to decrypt it like they did here.
@doomy how would @protonprivacy “un-hash” it if they needed to send you a recovery email? A hash is one way.
All they can do is encrypt it (which I’m sure they do), but in that case they’ll have the keys to decrypt it like they did here.