Hacker News new | past | comments | ask | show | jobs | submit login

There is no control outside; via the stream they control visibility, access, set, and setting. Streams are also heavily one-sided; nothing to throw you off.

The technique is to control everything, basically.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: