Are supply chain attacks possible in that ecosystem though?
from what I understand the OS verifies the developer signature but I don't know the exact mechanisms
Please Login to reply.
No replies yet.