You advocate breaking the first link in the chain of security.
If anyone can install any OS they want on any device in their possession, even if it’s a device they stole from me, then that reduces my security.
I prefer to keep all the links in the chain of security as unbroken and undamaged as possible, and if the only way to do that is to have a company like Apple run a closed walled garden, then I’m okay with that.
Give me an alternative that doesn’t require the Apple solution but still actually works, and I’ll be happy to take a look at it. But so far, the market hasn’t come up with anything that can compare or compete.
If anyone can install any OS they want on any device in their possession, even if it’s a device they stole from me, then that reduces my security.
I prefer to keep all the links in the chain of security as unbroken and undamaged as possible, and if the only way to do that is to have a company like Apple run a closed walled garden, then I’m okay with that.
Give me an alternative that doesn’t require the Apple solution but still actually works, and I’ll be happy to take a look at it. But so far, the market hasn’t come up with anything that can compare or compete.