Hacker News new | past | comments | ask | show | jobs | submit login

Usually they use things like write blockers to prevent accidental modification of the data, at least with hard drives.



> they use things like write blockers

Q: How could you verify that a write blocker was actually used, and that it functioned as described?


Just as with most things for physical evidence, paper trail documenting what was done by whom and when, plus the testimony of these people. Think the equivalence of "how do you verify that the fingerprints shown as exhibit A were actually taken off that gun?" - if it's disputed, the forensics expert testifies what they did and without very specific counterarguments the juries generally trust that it's true.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: