Apple can provide cover for this restriction by touting their T2 security chip and underlying architecture that enables their chain-of-trust. It just so happens that they're the only company that is authorized to use those chips, so it's a very wink-and-a-nod excuse at best.
Apple can provide cover for this restriction by touting their T2 security chip and underlying architecture that enables their chain-of-trust. It just so happens that they're the only company that is authorized to use those chips, so it's a very wink-and-a-nod excuse at best.