▲ | james_marks 17 hours ago | |||||||||||||||||||||||||||||||||||||||||||
You can watch network traffic for data leaving the device. Trust but verify. | ||||||||||||||||||||||||||||||||||||||||||||
▲ | 3eb7988a1663 16 hours ago | parent | next [-] | |||||||||||||||||||||||||||||||||||||||||||
For something as compressible as voice, I do not know how you would feel confident that data was not slipping through. Edge transcription models (eg Whisper) are continuing to get better, so it would be possible for malware to send a single bit if a user says a trigger word. | ||||||||||||||||||||||||||||||||||||||||||||
▲ | lxgr 17 hours ago | parent | prev [-] | |||||||||||||||||||||||||||||||||||||||||||
Good luck auditing even just a single day of moderately active web browsing. | ||||||||||||||||||||||||||||||||||||||||||||
|