Remove Accountability Remove Cybersecurity Remove Personal Security Remove Surveillance
article thumbnail

Apple Guidance on Intimate Partner Surveillance

Adam Shostack

The document includes checklists, which are available separately: If you want to see if anyone else has access to your device or accounts. Defending against attackers who are both authorized and “interface-bound” is a weird problem for information security, as traditionally defined.