Global Feed Post Login
Replying to Avatar Ron Stoner

That’s the only way I’ve seen it done prior. The unknown questions with bigger ramifications are:

- Backdoors

- Internal corporate spy/informant

- Targeted device exploitation/exfiltration

- Cryptography failures

- Something something synced cloud storage

Avatar
corndalorian 2y ago

💯

Reply to this note

Please Login to reply.

Discussion

No replies yet.