• blindsight@beehaw.org
    link
    fedilink
    arrow-up
    1
    ·
    edit-2
    1 year ago

    The idea is also that a compromised system will remains compromised after all storage drives are removed.