Are supply chain attacks possible in that ecosystem though?

Reply to this note

Please Login to reply.

Discussion

from what I understand the OS verifies the developer signature but I don't know the exact mechanisms