Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Apparently it's impossible to differentiate between someone who does need them and someone who is exploiting the system.

Id argue they perhaps don't need them and the whole thing is a farce



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: