- cross-posted to:
- longreads@sh.itjust.works
- cross-posted to:
- longreads@sh.itjust.works
This is a very entertaining and educational article, giving insights into the methods used by thiefs to try and get access to your phone data.
I don’t like Apple but it’s great that their security is so good when it comes to this.
This means when someone says ‘this malware is abusing me’ the answer is always some version of ‘remove that malware’. Asking the same question a million different ways, a million different times, doesn’t change its answer.