Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It is standard operating procedure to abuse a contact once you acquire it. They're just doing what every other business and institution does on the Internet.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: