top | item 27604794

(no title)

TwoBit | 4 years ago

Doesn't that require the device to have been unlocked in the first place?

discuss

order

Hackbraten|4 years ago

A device can be compromised while the encrypted user data volume is still locked.