Comment by mixmastamyk
3 days ago
A forensic study… audit of the source code, firewall logs, and device storage would be enough information to determine if it is happening or not.
Absolute proof it could never happen? No, but we don’t need that.
3 days ago
A forensic study… audit of the source code, firewall logs, and device storage would be enough information to determine if it is happening or not.
Absolute proof it could never happen? No, but we don’t need that.
No comments yet
Contribute on Hacker News ↗