Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I am probably the only one but the geek in me would love to see an article where digital forensics are used against the most common operating systems in their most secure configuration - just to see how they compare with one another.


> most common operating systems in their most secure configuration

Air-gapped and turned off?


All is well




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: