Can we add something into the security considerations for this document
which discusses the exposure of the jid in "by", please?

Dave.

Reply via email to