Comment by Joel_Mckay
16 days ago
Location telemetry, listening devices, and exfiltration of protected sources.
A 3rd party locked down system can't protect people from what the law should. =3
16 days ago
Location telemetry, listening devices, and exfiltration of protected sources.
A 3rd party locked down system can't protect people from what the law should. =3
No comments yet
Contribute on Hacker News ↗