We touched on this seven years ago, and a current grad student, Sean, asked that I re-open it for discussion about what changes, if any, have take place in the intervening years. Thoughts from readers?
Cyber security professional here -reliably determining when a computational artifact (file, etc.) was created is *hard*. This is sorta why…




Leave a Reply to David Wallace Cancel reply