Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Are there any best practices on using one of the "-sk" key types and authorizing usage with your security key, vs. storing the whole ssh key on the security key?


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: