Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Sure, I know general techniques and k8s-specific ones (and have used production SSH-to-programming environment REPLs with twisted). I’m asking partially because my job these days is to secure setups like these :)


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: