@dansup @pixelfed Guess it depends on impersonation as a threat vector.