Can an attacker store potentially incriminating data unencrypted on a node?

15 posts were split to a new topic: How bloom filters work