Dude...what? Apple layer one device...? OSI model devices...?
I hate to be pedantic, but you’re talking computer mumbo-jumbo like a n00b.
What exactly is he saying that's wrong? Using Apple hardware (Layer 1), isn't going to change anything if your OSI Model devices(Your communication system/model, which includes switches, routers, gateways, "people" or anything that interacts with your secure hardware, etc.) is subject to compromise.
In other words, you can have the most secure bank vault in the world, but if the guy that carries stuff into and out of the bank vault is a thief, it's not going to make any difference.
Are you familiar with the OSI model?
I don’t mean to be a smart ass but, I am going to come off that way by virtue if the challenge and tenor of your response.
I get paid big bucks to do this for many corporations and most of the people on these threads are fairly familiar with me.
If you are not, then I excuse you.
Further, if you aren’t at least familiar with the OSI model, then my response require more words than I might usually employ.
Let me know.
If you’re not familiar with the OSI, mouse trapping, white hatting, encryption, various software strategies for firewalling, etc then I’ll have to give a fairly complete and fulsome response which I probably don’t have time to construct.
I did write something on this subject a year or two ago and it might be useful.
Sincerely,
Your nOOb.