Hacker News new | past | comments | ask | show | jobs | submit login

2FA wouldn't have necessarily solved this, if the hackers had access to an engineer's ssh keypair (e.g stolen laptop) they could clone repos as they pleased. 2FA isn't a silver bullet.



Could use a Yubikey (or similar) for SSH access.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: