Is this a screen shot from a third party twitter client circa 2009?
Is this a screen shot from a third party twitter client circa 2009?
More importantly. I’m gonna use these screenshots, that could easily have been modified, as the basis for my entire understanding of “privacy versus security”. Without reviewing any of the sources.
I believe Abraham Lincoln summed it up in that famous meme: “If it’s a quote on a picture on the internet, it’s gotta be true”
Or learn about app pinning (android) and guided access (iOS)