Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Then you just process basic metadata. Size, IP source, destination, timing, and statistical analysis of the binary. Assuming that they have ways of converting IP to an identity that information alone would be hugely revealing. In fact basic metadata is what they have admitted to recording.


Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: