Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Half (more probably 99% actually) of our critical infrastructure software use that wording (or an equivalent one), regardless of it is free software or proprietary software.

Yet most are maintained responsibly, if they are used for serious stuff and/or advertise in a way that suggest that kind of usage can be considered.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: