Exemple: How does Apple guarantee that the iOS source code will not be discovered by an adversary?

Is there any type of different encryption for this case?

  • @[email protected]
    link
    fedilink
    English
    19 months ago

    Kinda true, some places develop on machines that don’t have Internet access, air gap between the sensitive data and an outward facing network

    • @[email protected]
      link
      fedilink
      English
      19 months ago

      FML, copying from stackoverflow on your phone to an airgapped terminal would be a massive PITA