top | item 41506026

(no title)

gigamick | 1 year ago

In general its used by remote devs who need to share things like API keys, tokens, credentials and other sensitive or auth related code.

It's actually used a lot.

discuss

order

verdverm|1 year ago

We're working to move away from managing sensitive credentials in this way. Mostly by removing humans from the process and handling.

If this is the primary use-case, I would emulate something like bitlocker and enterprisey features for $