Comment by achandra03
19 hours ago
I don't think the author is trying to pretend this is some sophisticated strategy you should actually use (note the chudjak in the image on github)
19 hours ago
I don't think the author is trying to pretend this is some sophisticated strategy you should actually use (note the chudjak in the image on github)
No comments yet
Contribute on Hacker News ↗