Yes, careful to whom you delegate and the scope of what you delegate. Does social media edit permission also grant access to your forgotten Keybase.io encrypted data?
But on balance, delegation is a worthwhile security feature to add to a system. See section 3 of n2vi.com/Auth.pdf for a real-life story.
Yes, careful to whom you delegate and the scope of what you delegate. Does social media edit permission also grant access to your forgotten Keybase.io encrypted data?
But on balance, delegation is a worthwhile security feature to add to a system. See section 3 of n2vi.com/Auth.pdf for a real-life story.