Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Is it not enough to have a full view of all network requests? How can surveillance happen if we have full knowledge of what enters and leaves the device? Is there any evidence of hidden network requests?


It's enough to detect the network requests and read some of them (since they are unencrypted as explained in TFA), but it's not enough to fix that.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: