upvote
That is easily avoided, but usually people think of opsec constraints after the fact.
reply