• Carighan Maconar@lemmy.world
    link
    fedilink
    English
    arrow-up
    5
    ·
    1 year ago

    Well how else would that work? You need a piece of software to enforce the permissions. Once that Software is gone, nothing exists to stop you.

    • stappern@lemmy.oneOP
      link
      fedilink
      English
      arrow-up
      1
      arrow-down
      10
      ·
      1 year ago

      but then dont call it a security thing, its just an annoyance. you encrypt your data if you dont want others to read it.