Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Then this keybinding and device ID management business accomplishes what, exactly, other than exercising extra steps?


He likes to do it from command line. The steps are always the same.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: