Hacker Read top | best | new | newcomments | leaders | about | bookmarklet login

Do you have any examples of how the iPhone is insecure? Genuinely curious.


view as:

In the age of the IME and the hundreds of billions of dollars the US spends on US covert operations. I'll let you guess what the path of least resistance is.

I think “examples” refers to hard proof. Anyone could make an unsubstantiated claim about anyone or anything else if they wanted to, so it is not very productive to include.

Legal | privacy