Anyone who has access to any involved network infrastructure can trace the cleartext communication and extract the credentials.
nudelbiotop
joined 1 year ago
Anyone who has access to any involved network infrastructure can trace the cleartext communication and extract the credentials.
This is the Lemmy issue for multi communities:
https://github.com/LemmyNet/lemmy/issues/818