By John Gruber
Simplify integrations with WorkOS Pipes.
Bruce Schneier:
The research is fascinating, but the attack isn’t really feasible. It requires a jailbroken phone, which is hard to pull off in an adversarial setting.
★ Thursday, 19 May 2022