Comment by ece
4 hours ago
Yes, they can take advantage of privacy violations, being able to misrepresent facts, and pointing to an infallible technology stack even though it is not.
4 hours ago
Yes, they can take advantage of privacy violations, being able to misrepresent facts, and pointing to an infallible technology stack even though it is not.
No comments yet
Contribute on Hacker News ↗