There are a number of legacy items we're storing. These could be used to get user information.
e.g. the device name is currently derived from the local portion of the registration email. This could be used by a malicious party to examine the db and determine the location of an individual. This info should be removed or encrypted so that it's not leaked.
There are a number of legacy items we're storing. These could be used to get user information.
e.g. the device name is currently derived from the local portion of the registration email. This could be used by a malicious party to examine the db and determine the location of an individual. This info should be removed or encrypted so that it's not leaked.