View Single Post
Posts: 32 | Thanked: 227 times | Joined on Aug 2016
#781
Originally Posted by mosen View Post
I was asking if it is available. Thanks!
So now how does turing security look like exactly if the user can do whatever he wants?
I mean, they go the length of doing a posh propriatary connector but leave it to the user to potentially open up everything else?
Help me, it looks like same "security level" as on any other sailfish device.
The development phone is wide open as far as security but I think the finished model will be closed up
 

The Following 4 Users Say Thank You to Dynamite For This Useful Post: