> Use Cases: Journalists & Whistleblowers, Personal Confidential Info, Temporary Credentials or Access Tokens.
Also
> However, without access to the source code, users cannot independently verify these claims. For casual users and most professionals, this level of trust is likely acceptable; for threat-model-sensitive users like whistleblowers, this may be a limiting factor.
- - -
There is seemingly no information in how this approach prevents privacy issues that other one-time-view services have.
> Use Cases: Journalists & Whistleblowers, Personal Confidential Info, Temporary Credentials or Access Tokens.
Also
> However, without access to the source code, users cannot independently verify these claims. For casual users and most professionals, this level of trust is likely acceptable; for threat-model-sensitive users like whistleblowers, this may be a limiting factor.
- - -
There is seemingly no information in how this approach prevents privacy issues that other one-time-view services have.