Because - as I’ve explained in the comment you replied to - it’s pretty easy to check it for yourself. Unless you believe that an Echo has a secondary cellular connection that’s only used while muted, any traffic must go over your configured connection.
Just look at the amount of transferred data while it’s muted. If there is data (beyond extremely low background traffic) I’m wrong. If there is no data, you’re wrong.
This is not some hypothetical metaphysical principle we’re talking about, it’s a product that you can analyse yourself. Put up or shut up.
Because - as I’ve explained in the comment you replied to - it’s pretty easy to check it for yourself. Unless you believe that an Echo has a secondary cellular connection that’s only used while muted, any traffic must go over your configured connection.
Just look at the amount of transferred data while it’s muted. If there is data (beyond extremely low background traffic) I’m wrong. If there is no data, you’re wrong.
This is not some hypothetical metaphysical principle we’re talking about, it’s a product that you can analyse yourself. Put up or shut up.
And I can do that all in 5 minutes without owning one?
Easily. The device doesn’t care who owns it, you can use one owned by another person.
I don’t know anyone who owns one either.
But go ahead, do your experiment and report back. Should only take you 5 minutes to prove your claim.
Why should I do it, when plenty of people have already done so, and reported the results I talked about?
Like who?
Are you unable to Google, or are you acting willfully dense?
First example I found: https://link.springer.com/article/10.1007/s00779-018-1174-x
Lol that looks like 5 minutes of work to you?
No, a study that studies way more than what I described doesn’t look like 5 minutes of work to me, why would it?