logoalt Hacker News

macintuxyesterday at 6:06 PM0 repliesview on HN

None of that sounds as straightforward as a dragnet would be. Most require a target to be identified.