Hacker News new | past | comments | ask | show | jobs | submit login

This seems to be the description of SSH keys capabilities except the user does not control them. Why did they not just use SSH keys? They are much more familiar, and all major bugs are already squashed for years.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: