It sounds like your threat model is a dude in khakis sitting there looking at your device and getting bored. Instead think about servers hoovering up all data that they can get their hands on and patiently storing everything that can give them a clue. Then they can run programs across all of that at once and get thousands of people in a button press.
It sounds like your threat model is a dude in khakis sitting there looking at your device and getting bored. Instead think about servers hoovering up all data that they can get their hands on and patiently storing everything that can give them a clue. Then they can run programs across all of that at once and get thousands of people in a button press.