It's not a bad idea to run your compromised phone & have a seperate device that you can use privately.

That's how I eventually weaned myself from apple devices.

Reply to this note

Please Login to reply.

Discussion

No replies yet.