Comment by mixmastamyk
6 months ago
A forensic study… audit of the source code, firewall logs, and device storage would be enough information to determine if it is happening or not.
Absolute proof it could never happen? No, but we don’t need that.
6 months ago
A forensic study… audit of the source code, firewall logs, and device storage would be enough information to determine if it is happening or not.
Absolute proof it could never happen? No, but we don’t need that.
No comments yet
Contribute on Hacker News ↗