Are supply chain attacks possible in that ecosystem though?
Discussion
from what I understand the OS verifies the developer signature but I don't know the exact mechanisms
Are supply chain attacks possible in that ecosystem though?
from what I understand the OS verifies the developer signature but I don't know the exact mechanisms