They can create a hernetic environment to fsck a copy to find what files are on the original, and then copy the target file content from the discovered addresses.
Otherwise I could shred say some paper evidence, and the course would reject a taped-up copy that shows my original document. Which they wouldn't, of course.
Otherwise I could shred say some paper evidence, and the course would reject a taped-up copy that shows my original document. Which they wouldn't, of course.