Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

By showing your workflow and that you can regenerate it 1:1 on demand.


That's making a LOT of assumptions, like that he saved the seed and so on.


Not just that, but a strong defense would also want to show evidence that the user actually ran those commands, for example, by providing shell history files.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: