Comment by nezhar Comment by nezhar 10 hours ago 0 replies Copy Link View on Hacker News This is a great example of why network restrictions on an application are not sufficient.