The only table you'd dump is the infected keys table. You wouldn't dump the users table (Which doesn't exist yet, but might if we do auth for moderation). This would allow other people to conduct research and interrogate the data. The downside is that they could keep copies of this forever which undoes #2.
The only table you'd dump is the infected keys table. You wouldn't dump the users table (Which doesn't exist yet, but might if we do auth for moderation). This would allow other people to conduct research and interrogate the data. The downside is that they could keep copies of this forever which undoes #2.