On 11.01.18 10:11, David via luv-main wrote:
> Quoting [1]:
> 
> How does this device work, exactly?
> 
> It uses a custom form of WiFi sniffing to detect questionable packets
> and send them to our servers to be analyzed 


Errr, how is that distinguishable from spyware?

And does it not make this "Importantly, it doesn't use deep packet
inspection." a lie? (Quoted in Robert's OP.)

It sounds remarkably like either an NSA tendril or just commercial data
gathering at the buyer's expense.

Heck, that's worse than installing a microphone in your house, to snoop
on your conversations and feed them back to data harvesting servers.
(Siri duffer if you do.)

Next, one could buy into IoT, so they can lock you out of your house,
or turn off your appliances, depending on how deeply you fall into the
hijackable gadget trap.

No cloud, no microphones, no snoopware, no IoT. Use primitive embedded
microcontrollers, either not externally networked, or without a
bootloader, so they can only be reflashed with a physically connected
programmer. Then it has a chance of serving you.

Erik
_______________________________________________
luv-main mailing list
[email protected]
https://lists.luv.asn.au/cgi-bin/mailman/listinfo/luv-main

Reply via email to