← Back to context Comment by formerly_proven 4 years ago Everyone else does that as well and it's not a substitute for end-to-end data integrity. 0 comments formerly_proven Reply No comments yet Contribute on Hacker News ↗
No comments yet
Contribute on Hacker News ↗