Comparison of secret managing schemes: Difference between revisions
imported>Lucc |
imported>Lucc |
||
Line 4: | Line 4: | ||
range from user passwords and Wifi passwords over private keys (ssh, ssl, ...) | range from user passwords and Wifi passwords over private keys (ssh, ssl, ...) | ||
to API tokens and similar things. Normally one would store this kind of | to API tokens and similar things. Normally one would store this kind of | ||
information in files with restricted access | information in files with restricted access rights (only readable by some Unix | ||
user) or even encrypt them on disk. Nix and NixOS store a lot of information | user) or even encrypt them on disk. Nix and NixOS store a lot of information | ||
in the world-readable Nix store where at least the former is not possible. People who track | in the world-readable Nix store where at least the former is not possible. People who track |