← Back to context

Comment by fragmede

20 days ago

It's not theater. If an attacker can duplicate your device, that's a problem.

Says who? How do you know what’s on my device, how much it matters to me, and what countless other options I have for recourse if that did happen?