Never heard about this procedure but sounds interesting. Is there anywhere to read about how this works?
https://docs.aws.amazon.com/pdfs/whitepapers/latest/security...
obviously not framed in terms of "here is how we create more e-waste" but you can see the additional barriers to attempting to reuse decommissioned hardware
https://docs.aws.amazon.com/pdfs/whitepapers/latest/security...
obviously not framed in terms of "here is how we create more e-waste" but you can see the additional barriers to attempting to reuse decommissioned hardware