Comment by Tostino
2 years ago
I mean I was partially joking about the origin of the dataset, but they likely could work with DoD at this point to get a model that is acceptable to put in place, after as many leaks as they have had.
2 years ago
I mean I was partially joking about the origin of the dataset, but they likely could work with DoD at this point to get a model that is acceptable to put in place, after as many leaks as they have had.
I believe they already have things track how documents are accessed and copied across their network. There’s definitely flaws in it, but it’s not completely open.