> Think about that from the perspective of a security threat model: what are the odds that your disgruntled spouse has access to your computer and knows your laptop password, but doesn't know your phone password?
Well, you might not have a password for your desktop - but might have a pin for your phone.
Or maybe it isn't your spouse, but your kid; they might share the computer - but not access to the phone?
<ed: i don't really disagree, but I also struggle with the 7 days (and not quite in the "perfect is the enemy of good"-sense:
>
Either way, I'm not sure I understand how 7 days make sense (seems too long, still).
Seems like either it should be ~14 hours to a day (sync at home every evening) - or it should be: phone has to be unlocked.
Well, you might not have a password for your desktop - but might have a pin for your phone.
Or maybe it isn't your spouse, but your kid; they might share the computer - but not access to the phone?
<ed: i don't really disagree, but I also struggle with the 7 days (and not quite in the "perfect is the enemy of good"-sense: >
Either way, I'm not sure I understand how 7 days make sense (seems too long, still).
Seems like either it should be ~14 hours to a day (sync at home every evening) - or it should be: phone has to be unlocked.