← Back to context Comment by foxhop 2 years ago I would say no, the two approaches may be used to validate each other. 0 comments foxhop Reply No comments yet Contribute on Hacker News ↗
No comments yet
Contribute on Hacker News ↗