top | item 36027170

(no title)

okennedy | 2 years ago

You are describing a different class of attacks. If the company owns the device, they should be free to (try to) lock it down all they want. OP is about Apple locking down devices that someone else ostensibly owns.

discuss

order

No comments yet.