Hacker News new | past | comments | ask | show | jobs | submit login

> Packet sniffing and hardware inspection both instantly disprove...

I'm under the impression that packet sniffing is useless with end-to-end encryption, but I could be wrong. I.e., you can tell that something is being sent, but you can't know what.




The theory is that we can still estimate how much data goes over the network. So if it were sending all audio to the cloud, we'd see.

It does however not exclude other information, like sending keyword flags, or storing audio fragments to send along with other messages later on.


Neither does it exclude the possibility of any "time-bomb"-type of features or future OTA updates altering the software's behavior.


If OP can show what they use to packet sniff those boxes, then life will be good and we can put the conspiracy theories to bed.

If they can't see all of the traffic, but just know where the traffic is going, then I don't think they did their homework.


You own the client. You can do anything to it. There is no way for encryption on the client to prevent you from inspecting the content.




Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | Legal | Apply to YC | Contact

Search: