I was thinking more of a traffic sniffing. e.g with nothing installed and after the initial activation traffic has passed, icloud disabled, take picture of a gun/whatever they could be interested with, see what happens then, apart from the obvious yahoo weather pulls etc., compare with 10 other phones in the same scenario. But I’m sure the hashes, if they exist, are bundled and sent via encrypted channel and I’m not a hacker or pentester anyway so I don’t really know what I’m talking about.

Reply to this note

Please Login to reply.

Discussion

Yeah the real question is to what degreecan introspection be achieved on the mesh network, since that is an entirely different pathway. The AI classification is very clever; it's local investigation and then communication via codes (hashes).An sophisticated snitch.

Considering that meshnet is used to distribute data across devices linked to different apple ids I’m sure it’s as secure as it gets. I hope someone smarter than myself will figure this out one day.

In a meanwhile - what do privacy cautions people use? GrapheneOS?