Hacker News new | past | comments | ask | show | jobs | submit login

That would work until the first security incident, then everything is owned by the hacker. Albeit with some cleanup necessary to take out the expired humans.



Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: