Comment by orf Comment by orf 4 hours ago 0 replies Copy Link View on Hacker News How does this work with more complex authentication schemes, like AWS?