Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Can you recommend a more factual and complete overview on Apple security architecture and bootchain than this bug-ridden article? I'm interested in hardware security (models).


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: