You don’t think they can detect MITM? Don’t you need a setup in the device itself to monitor traffic, but the system will be oblivious to it?
Do you think E2EE is only for consumers? How do you know if e2ee traffic from OS is asking for an “update” or is a tracking beacon or activity monitor?
I am genuinely interested in knowing how this could be caught without their Google specific source code.
Google is not a startup with engineers just out of college. It literally hires staff from spy agencies.
I totally believe this. Yes. Absolutely.
When would a major corporation from a culture that jacks off to cyberpunk dystopia lie?
You don’t think some nerd would have caught the network traffic on his firewall? Had a buddy watch his scrolling logs for giggles.
No trust involved. Filter logs to only display the device, turn the mic off, talk at it. You don’t think anyone ever tested this for giggles?
I’d try but my Minis are in the ceilings, can’t get to the microphone switch.
You don’t think they can detect MITM? Don’t you need a setup in the device itself to monitor traffic, but the system will be oblivious to it?
Do you think E2EE is only for consumers? How do you know if e2ee traffic from OS is asking for an “update” or is a tracking beacon or activity monitor?
I am genuinely interested in knowing how this could be caught without their Google specific source code.
Google is not a startup with engineers just out of college. It literally hires staff from spy agencies.
You think they sell someone within a degree of someone who could do that the same hardware as the average rube?
You think they can’t do shadow-mesh bullshit like TV’s do?
You think they transmit all data in the moment thwy receive it?
And… Do you know anyone who has tried? I haven’t.