The impression I get is that hackers consider the information benefit of allowing it to be worth the collateral damage to potential developers, for more or less the same reasons that people use Crocker’s Rules. That is only an impression; I am near to, but not part of, said culture, and cannot speak for it.
Upvoted for the concrete example.
(something about the echo in your first line makes me feel like my phrasing offended you. For purposes of debugging my social module, I would appreciate it if you confirm or deny that.)
The impression I get is that hackers consider the information benefit of allowing it to be worth the collateral damage to potential developers, for more or less the same reasons that people use Crocker’s Rules. That is only an impression; I am near to, but not part of, said culture, and cannot speak for it.
Upvoted for the concrete example.
(something about the echo in your first line makes me feel like my phrasing offended you. For purposes of debugging my social module, I would appreciate it if you confirm or deny that.)