Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Not completely, that’s why most of those also have self-hosted solutions available.

It is different in at least one important way: secrets (Such as private keys) are used to secure things (Such as code, data, or conversations) and thus are usually given a higher security priority (Like much tighter access control).



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: