Hacker News new | past | comments | ask | show | jobs | submit login

In addition to having the access keys to github, it also requires access to the secret in the pgp key which gives you identity proof. Ideally that's password protected too.

It's defense in depth.




That password is potentially ten lines down in the keylogger report. Depth isn't as deep as you think.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: