Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I don't think people care about the idea that a sufficiently advanced attacker with physical access the hardware can restore old data anywhere near as much as they care that the next customer along gets a fully readable copy of your data just handed to them.


Yeah if the attacker has physical access there are other, even more awful things he can do.


The attacker could get physical access at the end of the hardware's life when the hardware is decommissioned and either thrown out, recycled, or sold.


Industry standard is to shred then recycle.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: