Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

My company has this. It encrypts any file touched on USB. And other software logs every app run. Prevents casual copying but easily circumvented. But somewhere logs may have enough info to trace the source of leak I guess.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: