Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It's step 1) of the scenario outlined in this comment:

https://news.ycombinator.com/item?id=33545541



It doesn't even have to be this convoluted. They can just do what they did with email. Step one, wait until they have the vast majority of users, then due to spam/'problematic' content, algorithmically block the vast majority of other instances from interacting with theirs.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: