Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Presumably it is to aid in finding the equipment used. Once they find the equipment and can positively identify it, they can use other evidence to establish to probable user of that equipment.

As for malicious actors, wouldn't that be a risk for most forms of evidence? Likewise, wouldn't many of the techniques used to establish the validity of other forms of physical evidence be applicable when these techniques are used?



Fingerprints and DNA, for instance, are significantly less trivial to fake.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: