top | item 28176049

(no title)

eivarv | 4 years ago

    Could someone tell me how that inspection works? Are there researchers who are given the source code?
It doesn't (with the exception of an exclusive program[0]). Not only do they generally make security work on their devices difficult – they have a history of suing companies that facilitate it [1].

[0]: https://developer.apple.com/programs/security-research-devic...

[1]: https://www.theverge.com/2021/8/11/22620014/apple-corellium-...

discuss

order

No comments yet.