top | item 41505797 (no title) anon695 | 1 year ago I love the simplicity, but can't imagine a lot of scenarios where this gets used in the real world, just out of curiosity what are the use cases for this app? discuss order hn newest gigamick|1 year ago In general its used by remote devs who need to share things like API keys, tokens, credentials and other sensitive or auth related code.It's actually used a lot. verdverm|1 year ago We're working to move away from managing sensitive credentials in this way. Mostly by removing humans from the process and handling.If this is the primary use-case, I would emulate something like bitlocker and enterprisey features for $ nighth4wks|1 year ago [deleted]
gigamick|1 year ago In general its used by remote devs who need to share things like API keys, tokens, credentials and other sensitive or auth related code.It's actually used a lot. verdverm|1 year ago We're working to move away from managing sensitive credentials in this way. Mostly by removing humans from the process and handling.If this is the primary use-case, I would emulate something like bitlocker and enterprisey features for $
verdverm|1 year ago We're working to move away from managing sensitive credentials in this way. Mostly by removing humans from the process and handling.If this is the primary use-case, I would emulate something like bitlocker and enterprisey features for $
gigamick|1 year ago
It's actually used a lot.
verdverm|1 year ago
If this is the primary use-case, I would emulate something like bitlocker and enterprisey features for $
nighth4wks|1 year ago
[deleted]