tag:blogger.com,1999:blog-37220752.post4091943921765807487..comments2023-10-12T15:18:33.305+02:00Comments on ignisvulpis: Application Secrets vs. Key PairsAnonymoushttp://www.blogger.com/profile/01265275474642785203noreply@blogger.comBlogger1125tag:blogger.com,1999:blog-37220752.post-73514825818191014802010-05-20T04:38:31.063+02:002010-05-20T04:38:31.063+02:00If you ever find out, I'd really like to know,...If you ever find out, I'd really like to know, too. I've been puzzled ever since LID (which uses GPG). There's also non-repudiation we get get for free with asymmetric keys.Anonymousnoreply@blogger.com