…I have one too, and newer readers might want to take a look at it, though they may have already inferred its contours.
Cyber security professional here -reliably determining when a computational artifact (file, etc.) was created is *hard*. This is sorta why…




Leave a Reply