GM Q, Max, Seth I’m really interested in your assessment of that thing. What are possible attack vectors and what usera running it in their local network with access to their personal data and credentials may risk? I just wonder if I am just a doomer in that matter or is there a serious threat.

Replies (1)