1 | initial version |
The risk is that there's other, possibly private or confidential information in that capture file, which you may not want to share. So you have to be careful about how you capture, with appropriate capture filters. Furthermore you can obfuscate the capture file by running it through tracewrangler for instance. Then you have to scrutinise the resulting capture to determine if you find the residual risk of the information you expose acceptable.