Yes, but how do I verify what is implemented? (Score: 2, Insightful) by Anonymous Coward on 2015-10-08 06:23 (#PTM2) Is there a way to verify the implementation of these claimed policies? If this was verifiable then Mr. Cook has nearly convinced me to purchase an iPhone.Otherwise this is all a bunch of claims likely spoken to win unmerited business. Re: Yes, but how do I verify what is implemented? (Score: 1) by wilson@pipedot.org on 2015-10-08 18:59 (#PWYV) You can find Apple's security white paper here: https://www.apple.com/business/docs/iOS_Security_Guide.pdfI would advise you to read it and draw your own conclusions.
Re: Yes, but how do I verify what is implemented? (Score: 1) by wilson@pipedot.org on 2015-10-08 18:59 (#PWYV) You can find Apple's security white paper here: https://www.apple.com/business/docs/iOS_Security_Guide.pdfI would advise you to read it and draw your own conclusions.