Hacker News new | past | comments | ask | show | jobs | submit login

It's also easier to encrypt a config file and provide the decrypt key externally.



So then the real secret is the key, which is provided "externally" ... how? Through command line parameters, some other config file, or environment variables? :P


Another encrypted config file. Obviously.


Encrypted files all the way down.


A file that’s protected appropriately or standard input.




Consider applying for YC's W25 batch! Applications are open till Nov 12.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: