Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Counterpoint, I have definitely taken them into consideration when designing my backup script. It's the reason why I hash my files before transferring, after transferring, and at periodic intervals.

And if you're designing a Hardware Security Module, as another example, I hope that you've taken at least rowhammer into consideration.





Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: