
Micah Lee 🫡 @micahflee
@JudeCNelson There isn't quite an implementation yet, but when there is, if there's a backdoor, it should be detectable. The published E2EE design looks solid, so if there's a hypothesis for exactly how a backdoor works, it should be possible to verify if it exists — PolitiTweet.org