top | item 41506026 (no title) gigamick | 1 year ago In general its used by remote devs who need to share things like API keys, tokens, credentials and other sensitive or auth related code.It's actually used a lot. discuss order hn newest verdverm|1 year ago We're working to move away from managing sensitive credentials in this way. Mostly by removing humans from the process and handling.If this is the primary use-case, I would emulate something like bitlocker and enterprisey features for $
verdverm|1 year ago We're working to move away from managing sensitive credentials in this way. Mostly by removing humans from the process and handling.If this is the primary use-case, I would emulate something like bitlocker and enterprisey features for $
verdverm|1 year ago
If this is the primary use-case, I would emulate something like bitlocker and enterprisey features for $