Hacker News new | past | comments | ask | show | jobs | submit login

I think it’s also think it’s interesting to consider from the perspective of side-channel attacks/information leaks. For the most part, I think text notes are well just text. But I shutter to think what other metadata, fingerprinting, or background conversations/information could be extracted from a bunch of audio. But maybe I’m just being overly paranoid.



Consider applying for YC's W25 batch! Applications are open till Nov 12.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: