All of the reasons you provided make sense. I suppose I can always review the plugin’s code myself to make sure its not possible to use the HTTP requests in a malicious manner.
Thanks for the clarification.
All of the reasons you provided make sense. I suppose I can always review the plugin’s code myself to make sure its not possible to use the HTTP requests in a malicious manner.
Thanks for the clarification.