Y
Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
points by
guyle
2 days ago
|
hide
|
0 comments
Interesting approach for embedded use cases. Curious how you see this compared to the OIDC trend in CI/CD where the goal is eliminating stored secrets entirely — different problem space but related threat model.
add comment