Hacker Newsnew | past | comments | ask | show | jobs | submitlogin



Interesting, but I suppose I was particularly interested if that's what's actually happening with the transformations in the example in the article. Are those making use of this protocol? The comment I originally replied to seems to imply they aren't.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: