Hacker News new | past | comments | ask | show | jobs | submit login

You can do exactly the same on a machine without a T2 chip though, so I’m not sure what makes this special vs any other time you give someone untrusted physical access to a device



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: