7 votes

The prototype iPhones that hackers use to research Apple’s most sensitive code

2 comments

  1. [2]
    Deimos
    Link
    I think this is an interesting article overall, but it's worth noting that Mathew Solnik's response to its publication was:

    I think this is an interesting article overall, but it's worth noting that Mathew Solnik's response to its publication was:

    The article that has been published regarding me is a complete hit piece. It provides no hard evidence and is based on pure rumor. It’s sad to see the publication stope to such levels. This is not worth any further response and will get none. End of Story.

    5 votes
    1. unknown user
      Link Parent
      I'd like to know what parts of the story Solnik thinks are "rumour", because a lot of the technology-side of this article is factually correct. Apple is not the only company that uses...

      I'd like to know what parts of the story Solnik thinks are "rumour", because a lot of the technology-side of this article is factually correct. Apple is not the only company that uses development/production fused distinctions between internal & external devices.

      6 votes