Return to Article Details Analysis of Information Security in Data Leaks in The PeduliLindungi Application Download Download PDF