• 0 Posts
  • 15 Comments
Joined 11 months ago
cake
Cake day: July 10th, 2024

help-circle










  • I don’t have the time right now to addeess all of this, but:
    Device interactions can be used to identify users, predict and manipulate their behaviour, contribute to further identification measures etc…

    Furthermore my point was that there are many reasons to be cautious about any type of data collection and processing. Saying a specific type would be ridiculous undermines the possible dangers stemming from this. Therefore I wouldn’t plainly discard these concerns.

    Even if, in this context, the transmission is not widely noticed, this doesn’t pose a universal guarantee, especially if this can be turned on on demand via backdoors, trojans or whatever. Even worse if the transmission can be hidden. (Less likely for very proficient users with extremely tight network monitoring & control, but that’s rarely the case.)