Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Yeah, this is exactly the opposite of reality. It is not "company's access to their phone", it is "company's control of their phone". I think you misunderstand what's being required of many people in exchange for access corporate information from their phone.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: