• @ABCDE@lemmy.world
    link
    fedilink
    English
    51 year ago

    They do limit you without a certain (hidden) key press if the developer isn’t on a trusted list.

    • @Flaky@iusearchlinux.fyi
      link
      fedilink
      English
      6
      edit-2
      1 year ago

      AFAIK it uses certificates for that, kinda like a more aggressive form of Windows’ User Account Control.