Hacker News new | past | comments | ask | show | jobs | submit login

It is a conspiracy, if there’s proof of a conspiracy.

Put a finger on the scales, show us how it’s done.

Modeling this behavior, without tilting the scales completely is perhaps impossible.

I’m interested in seeing how such code could work, while scaling and not creating artifacts. I can’t think of anyway for such code to be deployed without breaking search and letting attackers gain even more




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: