Comment by binary132
2 years ago
It’s like how QRs can be abused to appear like certain images, just a little stunt on top of the implementation
2 years ago
It’s like how QRs can be abused to appear like certain images, just a little stunt on top of the implementation
No comments yet
Contribute on Hacker News ↗