Hacker News new | past | comments | ask | show | jobs | submit login

Thanks, though as a caution, I'm not fully sold myself, and I'm curious about cases in which information, knowledge, storage/retrieval, transmission, or processing might be either defensive or equalisers.

Various forms of camouflage come to mind. Though the thought occurs that those can also be used by the more- and less-empowered, perhaps asymmetrically.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: