That, in a nutshell, is the theme of this recent article by my former colleague Sandy Levinson. Discuss! (Submit comments only once, they may take awhile to appear. Signed comments are more likely to be approved.)
Cyber security professional here -reliably determining when a computational artifact (file, etc.) was created is *hard*. This is sorta why…




Leave a Reply