(1) Explicitly connect vulnerable adults’ identities to their online activity, putting them at risk of leaks and harassment
(2) Move “undesirable” behavior to under-moderated environments that are less safe for people to access
(1) Explicitly connect vulnerable adults’ identities to their online activity, putting them at risk of leaks and harassment
(2) Move “undesirable” behavior to under-moderated environments that are less safe for people to access