Hacker News new | past | comments | ask | show | jobs | submit login

What if the activation of the microphone for marketing purposes occurred not systematically but randomly, making it harder to detect such functionality? And what if this functionality were activated with code loaded remotely at the moment it needs to be used?



Consider applying for YC's Summer 2025 batch! Applications are open till May 13

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: