Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
krnlpnc
on March 25, 2022
|
parent
|
context
|
favorite
| on:
If you’re not using SSH certificates you’re doing ...
What mechanism is used to protect the key of the certificate authority?
9dev
on March 25, 2022
[–]
That’s a different situation - the CA key resides on some high security server, not a developer laptop that may get stolen or compromised by ordinary usage.
Join us for
AI Startup School
this June 16-17 in San Francisco!
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: