Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Is there a description somewhere for how they're handling the security of secret keys on their end?

Also, it looks like the libraries are only offered as tarballs and are being served over HTTP?




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: