jerryc41 wrote:
That's more technology than I need, but I can see it being used for spying. : (
If it works like other remote connections say like Quick Assist, it will only connect after the person gives permission to connect. I have a very good friend who is an Computer IT specialist. We have purchased several Desktop computers from him as well as a laptop. He lives in Washington and when I have problems with our computers he will use Quick Assist to remotely see what's happening and fix problems etc. He sends me a request and I have to accept before the connection is made.