Hacker News new | past | comments | ask | show | jobs | submit login

It was just an example how you could detach the secret and the device made by Apple. I'm sure there are better ideas for that. The way this is configured now Apple can decrypt any phone, which voids the argument made in the OP. But I can understand why this will be the unpopular opinion here.



Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: