Comment by nephanth Comment by nephanth 4 days ago 0 replies Copy Link View on Hacker News Of course but configuration for software is exactly what hidden files are usually used for