| ▲ | BoppreH 4 days ago | |
Counterpoint, I have definitely taken them into consideration when designing my backup script. It's the reason why I hash my files before transferring, after transferring, and at periodic intervals. And if you're designing a Hardware Security Module, as another example, I hope that you've taken at least rowhammer into consideration. | ||