Reply to post: Re: Wait a minute.

Oops: Bounty-hunter found Vine's source code in plain sight

Crazy Operations Guy

Re: Wait a minute.

" Even if they weren't in the image they would have to be available to the image, and in this case you'd have full control over it. "

I suppose that could be fixed by putting the keys and secrets into a shared DB table so that you'd at least need access to the their private network, maybe authenticate using a certificate for additional security. Plus would make it easier to update the keys if they got leaked, or just changing them routinely as procedure.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon