Hacker News new | past | comments | ask | show | jobs | submit login

The phone network can do that just by correlating traffic to devices, it doesn't need any help from the software running on those devices.

If the target use case was people that could reasonably do the job of limiting the information just the use of their devices leaked, it might matter. But the target use case is replacing SMS and the like, so it really doesn't matter (except that people want to pretend that the use case is something other than replacing SMS).

https://medium.com/@thegrugq/signal-intelligence-free-for-al...




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: