Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Has anyone done a thorough security analysis of any of their devices? Do they phone home or otherwise open some sort of back door? I agree that it does seem too good to be true


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: