Comment by Evidlo Comment by Evidlo 6 months ago 0 replies Copy Link View on Hacker News What if the information comes outside a system they control or organization they have no prior experience with?