• CosmicGiraffe@lemmy.world
    link
    fedilink
    arrow-up
    1
    ·
    5 hours ago

    I think multiple people already have access to the databases that store the data the device sends. I don’t really care whether they get the data from the device itself or from the database.

    Similarly, I think multiple people have the ability to make changes to the firmware build and the systems that distribute it. So those people already have the potential ability to gain access to the device.

    One person or multiple people having unauthorised access are both unacceptable. I’m saying that the users have to trust the companies ability to prevent that occurring, and that therefore this particular technical detail is mostly irrelevant