Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

You advocate breaking the first link in the chain of security.

If anyone can install any OS they want on any device in their possession, even if it’s a device they stole from me, then that reduces my security.

I prefer to keep all the links in the chain of security as unbroken and undamaged as possible, and if the only way to do that is to have a company like Apple run a closed walled garden, then I’m okay with that.

Give me an alternative that doesn’t require the Apple solution but still actually works, and I’ll be happy to take a look at it. But so far, the market hasn’t come up with anything that can compare or compete.



Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: