Hacker News new | past | comments | ask | show | jobs | submit login

That is not impervious: compromise an endpoint. It takes work, but in the course of a serious investigation it can get done. At the limit, Van Eck or similar analog-hole analogues.

Anyway, my position is "no, that should not be illegal", though I am not entirely confident in that.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: