Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

If it requires a cloud account it isn't purely offline software. How else do they authenticate you?


It's purely offline software that reaches out to the cloud solely to spy on me and/or make me log in. There are no online features I need or want from it.

What authentication do I need or want on a local device that is software specific?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: