Exemple: How does Apple guarantee that the iOS source code will not be discovered by an adversary?

Is there any type of different encryption for this case?

  • Munkisquisher@lemmy.nz
    link
    fedilink
    English
    arrow-up
    1
    ·
    9 months ago

    Kinda true, some places develop on machines that don’t have Internet access, air gap between the sensitive data and an outward facing network

    • towerful
      link
      fedilink
      English
      arrow-up
      1
      ·
      9 months ago

      FML, copying from stackoverflow on your phone to an airgapped terminal would be a massive PITA