Hacker News new | past | comments | ask | show | jobs | submit login

The phone network can do that just by correlating traffic to devices, it doesn't need any help from the software running on those devices.

If the target use case was people that could reasonably do the job of limiting the information just the use of their devices leaked, it might matter. But the target use case is replacing SMS and the like, so it really doesn't matter (except that people want to pretend that the use case is something other than replacing SMS).

https://medium.com/@thegrugq/signal-intelligence-free-for-al...




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: