My understanding of it (and I could be wrong I’m not that invested in this) is that the first iteration used their Mac fleet, while the second iteration was spoofing IDs. This would be the third iteration.
It was a few days ago I read this, I’d have to look up the source again
I have no problem with this third iteration. There’s plenty of Mac users with android phones. If you’re using your own machine ID, have at ‘er.
I don’t think they ever charged anybody, they suspended that idea after the first outage.
Also, they were using their own fleet of Macs, hence why Apple was able to isolate them easily if they’re all centrally located.
My understanding of it (and I could be wrong I’m not that invested in this) is that the first iteration used their Mac fleet, while the second iteration was spoofing IDs. This would be the third iteration.
It was a few days ago I read this, I’d have to look up the source again
I have no problem with this third iteration. There’s plenty of Mac users with android phones. If you’re using your own machine ID, have at ‘er.