Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Can you share some of these protocols? I’m curious as to how I should approach these same issues!

I like to think of it as “we didn’t fall out of the trees all that long ago, in evolutionary terms!”





Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: