Open Koffeegod opened 8 years ago
There are many ugly and fun issues hiding in the problem of how to do local presence (especially with BLE) without turning our software into a spy tool. This work item is to write out the protocol for how to implement presence without being evil.
There are many ugly and fun issues hiding in the problem of how to do local presence (especially with BLE) without turning our software into a spy tool. This work item is to write out the protocol for how to implement presence without being evil.