Hacker News new | past | comments | ask | show | jobs | submit login

Yeah if the attacker has physical access there are other, even more awful things he can do.



The attacker could get physical access at the end of the hardware's life when the hardware is decommissioned and either thrown out, recycled, or sold.


Industry standard is to shred then recycle.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: