Any time you bridge your node to an application that operates over the web you introduce a potential surface for metadata exposure and operational logging on the application side. The trade off between usability and privacy is inherent here and the real safeguard is to run your node in a security conscious environment while understanding exactly which permissions you grant through baked macaroons...
Any time you bridge your node to an application that operates over the web you introduce a potential surface for metadata exposure and operational logging on the application side. The trade off between usability and privacy is inherent here and the real safeguard is to run your node in a security conscious environment while understanding exactly which permissions you grant through baked macaroons...