Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Isn't the visual identification and jamming from other events?

Can you share where it is best thoroughly debunked? The stuff linked so far in this thread (Friedman podcast; pilot Lehto analysis) isn't good.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: