Hacker News new | past | comments | ask | show | jobs | submit login

Anytime you use a device you need to trust the manufacturer itself is not malicious. The difference between storing and decrypting a database on an internet-connected Apple device and storing it in Appleā€™s iCloud is minuscule.



Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: