Are supply chain attacks possible in that ecosystem though?
Login to reply
Replies (1)
from what I understand the OS verifies the developer signature but I don't know the exact mechanisms