This is pretty damning. Is it fair? Substantive replies only; full name in the author line and a valid e-mail address required.
Cyber security professional here -reliably determining when a computational artifact (file, etc.) was created is *hard*. This is sorta why…




Leave a Reply to Christopher Ruth Cancel reply