• @Zpiritual
    link
    English
    23
    edit-2
    7 months ago

    He may be referring to this:

    The concerns include the abuse of remote validation of software (where the manufacturer‍—‌and not the user who owns the computer system‍—‌decides what software is allowed to run) and possible ways to follow actions taken by the user being recorded in a database, in a manner that is completely undetectable to the user.