Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Off the top of my head: if you can change those bytes, sophisticated thieves can change those bytes, and eventually anybody buying a kit on the open market can change those bytes.

Also, as I previously mentioned, sophisticated thieves can block traffic anywhere other than Apple by default.



Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: