← Back to context Comment by brador 1 year ago Or replace user id with a hash, that way one could identify patterns without premature witch hunts. 0 comments brador Reply No comments yet Contribute on Hacker News ↗
No comments yet
Contribute on Hacker News ↗