Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Really mostly convention. Yes you could label it that way, but people consider it to be enough of it's own thing to not do so. (+ there is some value in not conflating the two because they do have different threat models etc and users should treat them differently too)


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: