Comment by emsixteen
3 months ago
… and then the return argument is that those who actually want to do this nefariously are already going to be able to hide device modifications/rooting.
3 months ago
… and then the return argument is that those who actually want to do this nefariously are already going to be able to hide device modifications/rooting.
No comments yet
Contribute on Hacker News ↗