logoalt Hacker News

foldrlast Monday at 5:55 PM1 replyview on HN

So provide some concrete examples of what you’re talking about, if it’s a real concern.


Replies

ohhman11last Tuesday at 6:22 AM

You understand that these aren't typically public, right? There's not any particularly good mechanism to discover abuse in this system in the first place, because the checks and balances are largely left to the requesting state.

show 1 reply