Comment by MemesAndBooze
1 year ago
What if the activation of the microphone for marketing purposes occurred not systematically but randomly, making it harder to detect such functionality? And what if this functionality were activated with code loaded remotely at the moment it needs to be used?
No comments yet
Contribute on Hacker News ↗