Comment by cess11
1 month ago
Eventually my so called smartphone will be a device for authenticating against a few services that require a special application, that I can also tunnel a serious device through for doing the things that I actually want to do.
It would be interesting to know why they're doing this, but it's unlikely it'll ever become public knowledge. I also don't think it is important, the people responsible should be in jail for a lot of other reasons anyway.
No comments yet
Contribute on Hacker News ↗