I don’t think that’s valid at all. Apple has consistently led on security and privacy issues. The encryption API we discussed is a great example of that. A huge amount of engineering effort went into a feature that only a few apps use & that also seriously pissed off the FBI.
-
-
1/2 Well, I’m not in infosec, but I would be surprised if attackers go for either a top of the line iPhone or a top of the line Pixel. They’ll go after staffers’ Windows desktops first, or just use phishing.
-
They’ll use phishing. Who’s gonna burn an 0day on a first time congressional candidate? ;) Shit, even the dnc and Podesta were just phishing. Phishing scales and it works.
- Show replies
New conversation -
-
-
Sufficiently that it’s probably not the key point. Honestly, I don’t think local attackers are in scope even in most of your use cases, though it’s good of you to think about it.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.