Comment by UltraSane Comment by UltraSane 2 days ago 0 replies Copy Link View on Hacker News Best practice is to use IP-restricted keys.