logoalt Hacker News

Calvin02yesterday at 9:39 PM1 replyview on HN

Threats exist in both trusted and untrusted environments though.

This feels like a really niche use case for SSH. Exposing this more broadly could lead to set-it-and-forget-it scenarios and ultimately make someone less secure.


Replies

smallmancontrovyesterday at 10:43 PM

Resource-constrained environments might be niche to you, but they are not niche to the world.