As an illustration, the security of information transmitted through chat or electronic mail could possibly be compromised and these types of information and facts may very well be utilized by Other individuals. As a result, this Application are unable to ensure any safety for such details in the midst of transmission by means of the internet infras