Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The people I know who work with medical data do indeed follow protocols like this, involving for example hardware security tokens and encrypted, physically secured private servers. Though, I believe this is more to protect patient privacy than the data itself.

More generally, I'm happy to presume (as long as the data is password-protected, say) that scientific data that hasn't obviously been vandalized is trustworthy. However, in this case we have positive evidence of tampering, and therefore a good reason to be skeptical.



I clearly know different people... The people I know have all their important data in "Copy of Copy of Copy of Datav2 - FINAL.xlsx" saved in an email from a PhD student.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: