Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I meant that it’s all pretty trivial business, focusing on the technicalities of what oracle is used in what security experiment.

Although if you were previously unfamiliar with the definitions at play I apologize for calling an informative discussion gain-less.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: