Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I'm beginning to think you don't want to understand, rather than you can't. I made it explicit the initial example was an extreme example just for illustration, not to give the least labor intensive process nor to provide in black and white a conspiracy blueprint for someone to follow.




Sorry I genuinely can't. Thanks for trying.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: