top | item 46725474

(no title)

Calvin02 | 1 month ago

Threats exist in both trusted and untrusted environments though.

This feels like a really niche use case for SSH. Exposing this more broadly could lead to set-it-and-forget-it scenarios and ultimately make someone less secure.

discuss

order

smallmancontrov|1 month ago

Resource-constrained environments might be niche to you, but they are not niche to the world.