logoalt Hacker News

tom1337yesterday at 9:36 AM1 replyview on HN

Never heard about this procedure but sounds interesting. Is there anywhere to read about how this works?


Replies

Maxiousyesterday at 12:30 PM

https://docs.aws.amazon.com/pdfs/whitepapers/latest/security...

obviously not framed in terms of "here is how we create more e-waste" but you can see the additional barriers to attempting to reuse decommissioned hardware