Hacker News new | past | comments | ask | show | jobs | submit login

No, that's not the case here. You don't need a parallel construction in this example, because the UFED extraction (even if tainted by a similar exploit) wasn't illegally obtained.



Didn’t know that, thank you!




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: