Hacker News new | past | comments | ask | show | jobs | submit login

If its really all open source, the way you know is to roll your own.



If your threat model is the service roll your own. Otherwise, trust but verify.


In this case, verify how? Ask and trust the answer?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: