Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

That's exactly how it works. Apple does the same thing everyone else does. But when Apple does it, it's "secure", and when everyone else does it, it's "insecure". Hope that helps.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: