Exemple: How does Apple guarantee that the iOS source code will not be discovered by an adversary?

Is there any type of different encryption for this case?

  • Munkisquisher@lemmy.nz
    cake
    link
    fedilink
    English
    arrow-up
    1
    ·
    3 months ago

    Kinda true, some places develop on machines that don’t have Internet access, air gap between the sensitive data and an outward facing network