Discussion about this post

User's avatar
Eric Grosse's avatar

Yes, careful to whom you delegate and the scope of what you delegate. Does social media edit permission also grant access to your forgotten Keybase.io encrypted data?

But on balance, delegation is a worthwhile security feature to add to a system. See section 3 of n2vi.com/Auth.pdf for a real-life story.

Expand full comment

No posts