Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Every Linux desktop system has a keychain implementation. You can of course always use your own system, if you don't like that. You can use different keys and your developers don't need access to the real key, until all the CI servers are down.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: