Hacker News new | past | comments | ask | show | jobs | submit login

The behaviour could be to some extent either autodetected via remote proxies or crowdsourced, possibly via trusted contributors.

Even a partially-effective list of high-profile instances would be useful.

Removal procedure might also be considered. Automated, with an integrated proxy check, might work.




Our experience with automating things like that is that it's too hard to get right. Maybe we could if we tried hard enough, but at the cost of other things that probably matter more.


Fair enough, though submitted.




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: