Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

What you’re talking about isn’t the foundational security model of the operating system, but telemetry and tracking systems built into it.

I’m very much opposed to those too, but comparing them to the security model is apples vs. oranges. All I’ve seen so far, is that telemetry doesn’t open up any glaring holes in the security model of the operating system, but I’d be interested if you have any proof of that.



The telemetry is built right into the security model of the OS - thus the security model is broken. OS that betrays me by telling someone what I'm running is insecure.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: