Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
mike-cardwell
on May 26, 2012
|
parent
|
context
|
favorite
| on:
Protecting a Laptop from Simple and Sophisticated ...
This is a very strange question. Presumably they'd get physical access to it using any of the methods anyone ever uses to get physical access to something...
Consider applying for YC's W25 batch! Applications are open till Nov 12.
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: