Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Valid point. I was speaking from the context quoted in SolaceQuantum's comment around public scraping.

It gets murkier with attached devices.

As long as it's made clear to the person attaching the device what data/why is taken (the article doesn't say), it's not entirely unreasonable - you're attaching your device to a foreign network and giving it permission to do what it wants. So it will do what it wants.

But that's a huge qualifier, and I suspect one that wasn't met here.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: