Mechanisms exist to configure embedded sensors on systems to: (1) Prohibit the remote activation of sensing capabilities; and (2) Provide an explicit indication of sensor use to users.
Mechanisms exist to configure embedded sensors on systems to: (1) Prohibit the remote activation of sensing capabilities; and (2) Provide an explicit indication of sensor use to users.