Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Still, it's not as easy as the person I was replying to made it sound.

How many Macs would you have to compromise before you randomly stumble upon a registered developer, let alone a registered Mac developer (of which there are far fewer than iOS developers)? And how much more secure is a developer's machine likely to be, and how much less is the user of such a machine likely to fall for common email attachment-based infection attempts?

At some point, the feasibility is low enough not to bother. That's what all security ultimately is, since nothing is foolproof.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: