Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Neither authenticity nor vulnerability are all that important (or I'd argue, even welcome) in a business context.


"I'm not sure how to do this... could you please help me out?"




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: