logoalt Hacker News

BoppreHlast Thursday at 8:54 PM0 repliesview on HN

Counterpoint, I have definitely taken them into consideration when designing my backup script. It's the reason why I hash my files before transferring, after transferring, and at periodic intervals.

And if you're designing a Hardware Security Module, as another example, I hope that you've taken at least rowhammer into consideration.