Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Which would be legally established in the absence of a) proof of intent at the time of the threat and b) proof of the threat itself (way to go, Internet). Just saying..


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: