Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

They can create a hernetic environment to fsck a copy to find what files are on the original, and then copy the target file content from the discovered addresses.

Otherwise I could shred say some paper evidence, and the course would reject a taped-up copy that shows my original document. Which they wouldn't, of course.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: