Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

At the end of the day "you get access to things based on proving your identity" is not a novel concept. How you deploy, operate, and enforce that is where the differences in technologies lie.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: