Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

     1. No informed consent that your device can do this
     2. No positive consent to use it
     3. No positive consent to allow others to use it on your behalf
     4. Who controls the spy network? 
     5. They are using your bandwidth and device (similar to theft of resources, albeit trivial amounts)


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: