Hacker News new | past | comments | ask | show | jobs | submit login

Safe assumptions are great for managing personal privacy, but in my view, one should be careful not to present them as facts in discussions. E.g. I use privacy shields on cameras to mitigate risk of eavesdropping, but I don't claim it's actually happening. People have also reverse engineered Echo devices and analyzed their network traffic, and when someone claims the devices are "listening to everything", I'm interested in whether the claim is really based on such analysis.



Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: