Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I'd say it's somewhere between the -soft hypothetical and landgrabs like T-anything that have been tried in reality.

Of course the real question we all want to see answered is did they dogfood the trademark application documents?



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: