Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Even if it is, it doesn’t matter. The problem Apple faces is how to prevent the other bad actors from abusing their API. The answer they’ve settled on is remove those capabilities from the API. Another answer would be to leave the capabilities but somehow only grant access to them to “trusted” parties.

I’m sure that would have gone over really well, too. /s



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: