logoalt Hacker News

roughlyyesterday at 4:12 PM0 repliesview on HN

It's also done through acquisitions, anticompetitive practices, exporting externalities, and exploiting consumer information asymmetries.