← Back to context Comment by alansaber 1 hour ago Simple, we make them use a company computer, log everything they've ever done then reverse engineer it 0 comments alansaber Reply No comments yet Contribute on Hacker News ↗
No comments yet
Contribute on Hacker News ↗