Theyre not saying anything about reading the key off the phone. Brute force the key by trying every key against the encrypted data dump.
- 0 Posts
- 3 Comments
Joined 3 months ago
Cake day: April 8th, 2025
You are not logged in. If you use a Fediverse account that is able to follow users, you can follow this user.
buffing_lecturer@leminal.spaceto Privacy@lemmy.ml•Apple Gave Governments Data on Thousands of Push Notifications21·1 month agoDoes ntfy solve this problem?
Does memos fit your use case?