As well they should. (Prior coverage of this malicious plan by the Australian government–I fear other state-controlled university systems may soon follow suit.)
Cyber security professional here -reliably determining when a computational artifact (file, etc.) was created is *hard*. This is sorta why…




Leave a Reply