Hacker News new | past | comments | ask | show | jobs | submit login

A simple flow chart or state diagram would show the vulnerability. I'm not saying it was intentional, but I believe the backdoor label can be applied to accidental entrances as well.

The bottom line is that Apple produced a device whose security features could be circumvented.




All security features can be circumvented. Security is not absolute




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: