My realistic assumption is that all this data will become public one way or another, so I'm trying to understand how we can make sure it can't be abused.
My realistic assumption is that all this data will become public one way or another, so I'm trying to understand how we can make sure it can't be abused.