Apologies if this topic has been discussed before.
As you may be aware, BREACH is a fundamental vulnerability in TLS where malicious parties can extract secret information from compressed HTTP messages. HTTP frameworks like Rails randomize tokens to mitigate this problem. Does Gitea do something similar? If not, what are the mitigations used to secure Gitea against this class of attacks?
I ask this because I maintain a Gitea instance with a low bandwidth uplink, and would like to speed things up by re-enabling HTTP compression.
Thank you for your time.