Comment by justin_oaks
3 hours ago
Ah, that's a clever mechanism. That way the secondary machine could not only keep the token secure, but also validate which DNS records to create.
3 hours ago
Ah, that's a clever mechanism. That way the secondary machine could not only keep the token secure, but also validate which DNS records to create.
No comments yet
Contribute on Hacker News ↗