Quote:
In one variety of the implementation it's the responsibility of a remote "sound server" with a "sound database", which is connected via WiFi or 3G to the reading device, providing sounds in response to specific trigger points. In another implementation, trigger points don't need to be specified individually in every book; rather, a book would receive a unique identifier and a client could access a remote trigger point database to fetch the related sound information.
|
Hmmm. And what would be the result if Anonymous or some other hacker group managed to get access to that remote "sound database"? Imagine a waiting room with people ereading while waiting for their appointment when the database is hacked. Suddenly it sounds like everyone is playing with a "fart" app...