Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I get to choose what software to run, though. If it becomes difficult for me to prove identity in more of everyday life without such a remotely-owned device, I am hosed on privacy.

This is true even if the protocols themselves protect privacy well, use zero knowledge proofs, etc… if Google can vacuum it all up from the device representing me, all the privacy-centric design makes no difference.



Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: