• viking@infosec.pub
    link
    fedilink
    English
    arrow-up
    2
    ·
    1 year ago

    In theory they can cut off everything, but it takes some more intrusive behavior on your phone. Essentially they can build a layer required to authenticate your phone as unmodified before allowing it to access any content, using a special api.