Originally Posted by Fedaykin
.. for which they don't need to intercept every shipped computing device to do, like I said.
nah, you just put requirements into manufacturers for backdoors to be built in.
(that's what my point is, this is happening - and it's broad spectrum. Phone collection data, and internet data is proof that it's not selective.)