Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> the user has the ability and responsibility to control all aspects of access to the keys.

It should be obvious to you that this is crazy talk.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: