Hacker News new | past | comments | ask | show | jobs | submit login

From a practical perspective, yes. From a threat model perspective not really.



It protects from a bunch of lesser threats, like backups leaking keys, anyone hacking a front end box getting keys, needing to rotate keys when employees change, etc.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: