Comment by Tostino

2 years ago

I mean I was partially joking about the origin of the dataset, but they likely could work with DoD at this point to get a model that is acceptable to put in place, after as many leaks as they have had.

I believe they already have things track how documents are accessed and copied across their network. There’s definitely flaws in it, but it’s not completely open.