Comment by tosapple
17 days ago
The 'extra users" method may not work in the face of a network investigation or typical file forensics.
Where CAs are concerned, not having the phone image 'cracked' still does not make it safe to use.
17 days ago
The 'extra users" method may not work in the face of a network investigation or typical file forensics.
Where CAs are concerned, not having the phone image 'cracked' still does not make it safe to use.
No comments yet
Contribute on Hacker News ↗