Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

     1. No informed consent that your device can do this
     2. No positive consent to use it
     3. No positive consent to allow others to use it on your behalf
     4. Who controls the spy network? 
     5. They are using your bandwidth and device (similar to theft of resources, albeit trivial amounts)


Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: