Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Sure, but you would have had to do that anyway if you didn't pick those RDBMS and rolled your own storage.

Luckily there's established patterns for key management and access control.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: