Warning: Some posts on this platform may contain adult material intended for mature audiences only. Viewer discretion is advised. By clicking ‘Continue’, you confirm that you are 18 years or older and consent to viewing explicit content.
My understanding of it (and I could be wrong I’m not that invested in this) is that the first iteration used their Mac fleet, while the second iteration was spoofing IDs. This would be the third iteration.
It was a few days ago I read this, I’d have to look up the source again
I have no problem with this third iteration. There’s plenty of Mac users with android phones. If you’re using your own machine ID, have at ‘er.
My understanding of it (and I could be wrong I’m not that invested in this) is that the first iteration used their Mac fleet, while the second iteration was spoofing IDs. This would be the third iteration.
It was a few days ago I read this, I’d have to look up the source again
I have no problem with this third iteration. There’s plenty of Mac users with android phones. If you’re using your own machine ID, have at ‘er.