Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I've just provided the easiest example of bypassing any boomer security nonmeasures. give a dedicated and competent attacker 15 minutes alone with your highly secure machine and highly sensitive documents, and if your entire security model depends on DRM rather than actually effective methods, they will figure out how to exfiltrate it all.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: