Hacker News new | past | comments | ask | show | jobs | submit login

There is such a presumption, but it's a bit of a mental shortcut, sort of like "water is incompressible". In some scenarios it's still useful to know how obvious the methods are if an attacker is supervised, how much unsupervised time they might need to successfully own the machine, and whether they would need to break any tamper-evident seals that could be checked afterward.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: