Nami on Nostr: npub1trdnq…gussx the deletion is executed by the app, not by the server. But yes, ...
npub1trdnqrfstufc45awha43p6xy2n0v6czuhapzh4r09hap08dg0c6s9gussx (npub1trd…ussx) the deletion is executed by the app, not by the server. But yes, both apps need to be trusted. The server just needs to be trusted that it respects the IMAP delete command of an e2e-encrypted email.
Anyway, in the threat models I described you can indeed trust all involved apps and server. Like in most real world cases, the threat is a social challenge, not a technical one. Technology just has to offer the means to defend against the social threat.
Anyway, in the threat models I described you can indeed trust all involved apps and server. Like in most real world cases, the threat is a social challenge, not a technical one. Technology just has to offer the means to defend against the social threat.