Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Well, you could start by not installing software that you know exfiltrates these data, like Microsoft Windows, or Adobe Flash...



Even in free software, do you audit everything you install? Information security is only as strong as the weakest link.


Why not start with software which isn't known to deliberately disseminate information about your computer. Sure, if you move the goalposts all day, you'll never score.




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: