The Theory of Rough Paths and Signatures (Part 1) | Dark Hacker News