Josh BeckmanEveryone agrees that passwords or secret access tokens require special attention and should never appear in logs or be easily accessible by anyone. We believe that personal information deserves the same consideration. And so does the private content users create using your software.
Jorge ManrubiaNavigating Personal Information With Care