The Theory of Rough Paths and Signatures (Part 2) | Dark Hacker News