Hacker News new | past | comments | ask | show | jobs | submit login

Doing that right means having a second cloud account (Google/Apple), or you'll still be handing them a logged-in phone.

(If your phone looks suspiciously empty or has a weird account, you might as well have said "no", that phone will be taking an extra detour.)




What happens if one has no Google or social media accounts (although I have an Android phone, I have neither—I've never set up an account on the phone)?

It seems to me these days if one doesn't have any such accounts one's likely to be singled out as being suspect or suspicious.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: