Hacker Timesnew | past | comments | ask | show | jobs | submitlogin

Step one for any kind of serious data extraction project would be to make a bit-for-bit duplicate of the origin.


Thankfully a lot of data extraction projects serious enough to beat somebody with a hammer are not serious enough to tamper with TPM.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: