| ▲ | Calvin02 5 hours ago | |
Threats exist in both trusted and untrusted environments though. This feels like a really niche use case for SSH. Exposing this more broadly could lead to set-it-and-forget-it scenarios and ultimately make someone less secure. | ||
| ▲ | smallmancontrov 3 hours ago | parent [-] | |
Resource-constrained environments might be niche to you, but they are not niche to the world. | ||