Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

That's true but then you still have to understand the data that is sent rather than where it is collected from. The of latter is much easier than the former from experience (I've had to reverse engineer a couple of protocols in my time)


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: