• 0 Posts
  • 1 Comment
Joined 8M ago
cake
Cake day: Jun 27, 2024

help-circle
rss

When the corporation controls the hardware and the OS it can easily break any encryption running there. Just include key loggers, break RNG entropy, extract keys from memory, or just capture any data before they are encrypted. Or just let the governments into the OS so they can do all that.