Hacker News new | past | comments | ask | show | jobs | submit login

If your identity is that sensitive keep a standard public key that is used by default, but for services where you might want your identity to not be linked to other accounts/places/activities have a separate key for each and specified where to use it in you SSH config (or by naming with the -i parameter on each ssh call).



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: