Hacker News new | past | comments | ask | show | jobs | submit login

Wouldn't a (high entropy) shared secret be more appropriate authentication scheme for connecting to a low power device like that?



This is entirely dependent on whatever thing you're trying to build.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: