Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

If they claim "here's the API you can use to control network access" but can then put arbitrary apps to work around that, that's the definition of backdoor access to the device.


I’m not supporting their approach. Why can’t this be thought of as a control API with a built in allow list ? Where the list is hidden by obscurity




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: