You can almost hear the TLA's grunt of relief. Maybe they won't 'go dark' after all.
I mean, hell, even if the consumer monitors the thing, a constant X mbps stream of strongly encrypted traffic to Google is normal.
What do we do? Demand that the device must give us (per-device) keys for the purposes of audit? Somebody will argue that that would open an attack vector...
I mean, hell, even if the consumer monitors the thing, a constant X mbps stream of strongly encrypted traffic to Google is normal.
What do we do? Demand that the device must give us (per-device) keys for the purposes of audit? Somebody will argue that that would open an attack vector...
@EFF, what do we do?