← Back to context

Comment by cess11

1 month ago

Eventually my so called smartphone will be a device for authenticating against a few services that require a special application, that I can also tunnel a serious device through for doing the things that I actually want to do.

It would be interesting to know why they're doing this, but it's unlikely it'll ever become public knowledge. I also don't think it is important, the people responsible should be in jail for a lot of other reasons anyway.