Hacker Read top | best | new | newcomments | leaders | about | bookmarklet login

The idea that this gives write access to my SSH keys is still scary. Not that I don't trust your service, but what if somebody attacks it and adds malicious keys?

Or does write access not include SSH keys?



view as:

Legal | privacy