Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Corporate networks get broken into all the time. Any machine that a copy of the repository is stored on is a potential attack vector.

Various strategies are used to specifically protect all kinds of sensitive systems far beyond simple network security. This article is a detailed exploration of a/some strategy/ies for protecting your git repository against malicious modification -- a scenario that is rare but far from unprecedented.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: