Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

And what if two companies standardized methods are incompatible?


They could hire a third company to copy the data from one standardized method to the other.


And now the threat model is at best "literally Dropbox"; at worst, "a Dropbox except built by a random startup or fly-by-night contractors".


You write a new standard to unify the existing two standards


Or you create some sort of middleware to talk between the two.


USB sticks usually, in my experience.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: