• SpaceCowboy@lemmy.ca
    link
    fedilink
    English
    arrow-up
    7
    arrow-down
    1
    ·
    16 days ago

    Yeah, right? It’s technology not magic. Anyone can monitor the traffic from a device on a network and if it were sending a significant amount of data when not activated, every third party security researcher would know within minutes. It would be well publicized by respected security research organizations if they were constantly sending voice data.