Comment by easyThrowaway
2 years ago
I wonder if any of those rules could be (mis)used to workaround or defeat iOs/macOs security features?
2 years ago
I wonder if any of those rules could be (mis)used to workaround or defeat iOs/macOs security features?
No comments yet
Contribute on Hacker News ↗