@siracusa I just read the Apple white paper on security around PCC and you seem like the right guy to ask this to: I*loosely* understand the protections and mitigations that have been made at the architectural level of the server side, but because the device does most of the authentication without user involvement could a compromised device in theory get steered away from those protections?