Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

If the system has no audit logs, the prosecutor would have no evidence of any of that.

And in a system this broken the defence could even argue that anyone could have done it and modified the logs to implicate the defendant. You can't use any data from this system as evidence.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: