• @Natanael
    link
    English
    15 months ago

    All they need to do is look for which Apple devices are being used as proxies and blacklist them

      • @Natanael
        link
        English
        15 months ago

        Does it make a difference? They still need to use Apple accounts and spoof real devices (serial numbers, etc, I’m guessing)