Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Did somebody sniffed what kind of request they use to send the data to the mothership?

I have one of their devices here, I will be pretty glad to use some spare network capacity to send them a few thousand fake crash report per hour. That's what they want, right?



They claim to use end-to-end encyption. If it's implemented properly, none of us can.

And while I understand your frustration and anger, DoSing someone is usually a bad idea.


A few thousand per hour is decidedly not a DoS.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: