Comment by ptx
5 hours ago
That sounds consistent with their classic embrace-extend-extinguish process [1]. Embracing with no significant user-hostile moves is step 1, and then abusing competitors and users comes as step 3 of the process. They need to briefly look less evil in step 1 to maneuver into position for step 3.
[1] https://en.wikipedia.org/wiki/Embrace,_extend,_and_extinguis...
No comments yet
Contribute on Hacker News ↗