164
Comments (10)
sorted by:
You're viewing a single comment thread. View all comments, or full comment thread.
2
WhiteTrashJesus 2 points ago +3 / -1

I guess it would be bad for someone to access that who shouldn't, but I would hope they have a paper backup

3
residue69 3 points ago +3 / -0

The issue is that our enemies now have an instruction manual that details how we'd restart the system. Now they know what to target and in what order to make restarting the system more difficult or impossible.

When I contracted for the fed gov't, I complained about how our IT security reports, which detailed security holes, were submitted via unencrypted email. DC finally required that we encrypt the reports using PGP. The bureaucrat I submitted my reports to was never able to view the encrypted reports.