Comment by keepamovin
2 years ago
I suppose it depends on which protocol, and which app, we're talking about, but...Interesting. Good analysis!
It's conceivable that connectivity checks flow to other servers than delivery traffic, and these are passed-through. Although addressing your more general critique of the "flurry" (good word! :)), requires noting that accomplishing this capability would involve compromising the app's servers. Such backdoors are again not outside the realm of possibility in the given threat model.
Do you see any possibilities for interference in the push interception capability described?
No comments yet
Contribute on Hacker News ↗