| ▲ | steelbrain 7 hours ago | |
Thank you for your comment! The usecase for something like this is when you control both sides, server & client. There is some basic HMAC auth built into each request. > I would recommend to sandbox if at all possible. Since the server is a standard binary that doesn't need any special permissions, you could create the most locked down user in your server that only has access to a limit set of files and the GPUs and it'll work just fine. This is encouraged. | ||