top | item 36027170 (no title) okennedy | 2 years ago You are describing a different class of attacks. If the company owns the device, they should be free to (try to) lock it down all they want. OP is about Apple locking down devices that someone else ostensibly owns. discuss order hn newest No comments yet.
No comments yet.