| ▲ | PunchyHamster 3 hours ago | |
now I want to know what dirty laundry are their upper management hiding on their devices... | ||
| ▲ | tosapple 2 hours ago | parent [-] | |
The 'extra users" method may not work in the face of a network investigation or typical file forensics. Where CAs are concerned, not having the phone image 'cracked' still does not make it safe to use. | ||