• Mongostein@lemmy.ca
    link
    fedilink
    arrow-up
    9
    arrow-down
    1
    ·
    edit-2
    1 year ago

    My understanding of it (and I could be wrong I’m not that invested in this) is that the first iteration used their Mac fleet, while the second iteration was spoofing IDs. This would be the third iteration.

    It was a few days ago I read this, I’d have to look up the source again

    I have no problem with this third iteration. There’s plenty of Mac users with android phones. If you’re using your own machine ID, have at ‘er.