Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Potentially, although that gets into social networks, feedback loops, status dynamics, information warfare, reputation systems, voting rings, sock puppets and other fun topics :)

Step 1 would be private lists.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: