Hacker News new | past | comments | ask | show | jobs | submit login

And the way you sync the databases as well, if you do that.



The point of those tools is that the security requirements on the database file are much less strict than on the tooling.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: