Comment by Joel_Mckay
18 days ago
Location telemetry, listening devices, and exfiltration of protected sources.
A 3rd party locked down system can't protect people from what the law should. =3
18 days ago
Location telemetry, listening devices, and exfiltration of protected sources.
A 3rd party locked down system can't protect people from what the law should. =3
No comments yet
Contribute on Hacker News ↗