Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It's one way to do it, not the only or simplest one? And once someone had done it, they tend to transition a bit to exploitation mode because why not (they think)? Is my impression


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: