Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
01HNNWZ0MV43FF
16 hours ago
|
parent
|
context
|
favorite
| on:
Stringly Typed
Not to agree, but this is the same for files on disk or data in a database, where the malicious or misbehaving peer might just be an older version of the same program
Consider applying for YC's Summer 2025 batch! Applications are open till May 13
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: