"We cannot control who sees what, we cannot see what users are doing, and we cannot verify that the software itself is secure ...