• viking@infosec.pub
      link
      fedilink
      English
      arrow-up
      2
      ·
      1 year ago

      In theory they can cut off everything, but it takes some more intrusive behavior on your phone. Essentially they can build a layer required to authenticate your phone as unmodified before allowing it to access any content, using a special api.