Exemple: How does Apple guarantee that the iOS source code will not be discovered by an adversary?

Is there any type of different encryption for this case?

  • Munkisquisher@lemmy.nz
    link
    fedilink
    English
    arrow-up
    1
    ·
    7 months ago

    Kinda true, some places develop on machines that don’t have Internet access, air gap between the sensitive data and an outward facing network