Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

And what if two companies standardized methods are incompatible?



They could hire a third company to copy the data from one standardized method to the other.


And now the threat model is at best "literally Dropbox"; at worst, "a Dropbox except built by a random startup or fly-by-night contractors".


You write a new standard to unify the existing two standards


Or you create some sort of middleware to talk between the two.


USB sticks usually, in my experience.




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: