Comment by Evidlo Comment by Evidlo a year ago 0 replies Copy Link View on Hacker News What if the information comes outside a system they control or organization they have no prior experience with?