Comment by justin_oaks
7 hours ago
Ah, that's a clever mechanism. That way the secondary machine could not only keep the token secure, but also validate which DNS records to create.
7 hours ago
Ah, that's a clever mechanism. That way the secondary machine could not only keep the token secure, but also validate which DNS records to create.
No comments yet
Contribute on Hacker News ↗