
On 11.01.18 10:11, David via luv-main wrote:
Quoting [1]:
How does this device work, exactly?
It uses a custom form of WiFi sniffing to detect questionable packets and send them to our servers to be analyzed
Errr, how is that distinguishable from spyware? And does it not make this "Importantly, it doesn't use deep packet inspection." a lie? (Quoted in Robert's OP.) It sounds remarkably like either an NSA tendril or just commercial data gathering at the buyer's expense. Heck, that's worse than installing a microphone in your house, to snoop on your conversations and feed them back to data harvesting servers. (Siri duffer if you do.) Next, one could buy into IoT, so they can lock you out of your house, or turn off your appliances, depending on how deeply you fall into the hijackable gadget trap. No cloud, no microphones, no snoopware, no IoT. Use primitive embedded microcontrollers, either not externally networked, or without a bootloader, so they can only be reflashed with a physically connected programmer. Then it has a chance of serving you. Erik