Don't worry, given their apparent compliance to threat-model, it's most likely stored somewhere on an adversarial database. Compliance by idiocy.
Don't worry, given their apparent compliance to threat-model, it's most likely stored somewhere on an adversarial database. Compliance by idiocy.