Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

So would you say the process and / or tech do you use to identify & trust the other side of the transaction is a zoom call with photo ID? Literally the next sentence of the paragraph you quoted?


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: