← Back to context Comment by rsynnott 16 hours ago One compromise is to tap inside; some systems do this. 0 comments rsynnott Reply No comments yet Contribute on Hacker News ↗
No comments yet
Contribute on Hacker News ↗