In the realm of “cool things that are cool,” an article on Motherboard notes how hackers and security researchers use “dev-fused” iPhones to bypass Apple’s protections and security features to help discover vulnerabilities and sensitive information. The dev-fused iPhones themselves are rate and have not finished the production process via Apple, making them akin to […]