← Back to context Comment by dist1ll 3 years ago The real crime is using HTTP for internal network communication. 4 comments dist1ll Reply avx56 3 years ago Instead of? jiggawatts 3 years ago A custom Enterprise PKI made up of hand-rolled shell scripts poking proprietary public cloud key vaults with OpenSSL, the bastion of quality and robustness. dist1ll 3 years ago That's not much worse than the abomination you described in your initial comment. parasubvert 3 years ago I see what you did there.
avx56 3 years ago Instead of? jiggawatts 3 years ago A custom Enterprise PKI made up of hand-rolled shell scripts poking proprietary public cloud key vaults with OpenSSL, the bastion of quality and robustness. dist1ll 3 years ago That's not much worse than the abomination you described in your initial comment. parasubvert 3 years ago I see what you did there.
jiggawatts 3 years ago A custom Enterprise PKI made up of hand-rolled shell scripts poking proprietary public cloud key vaults with OpenSSL, the bastion of quality and robustness. dist1ll 3 years ago That's not much worse than the abomination you described in your initial comment. parasubvert 3 years ago I see what you did there.
dist1ll 3 years ago That's not much worse than the abomination you described in your initial comment.
Instead of?
A custom Enterprise PKI made up of hand-rolled shell scripts poking proprietary public cloud key vaults with OpenSSL, the bastion of quality and robustness.
That's not much worse than the abomination you described in your initial comment.
I see what you did there.