• HairHeel@programming.dev
    link
    fedilink
    arrow-up
    2
    ·
    1 year ago

    we’re talking about a hypothetical one-off situation on a computer that isn’t yours though; right? That happens from time to time, and an authentication process that requires you to persist your auth information on disk carries some extra risks. You need to remember to delete it when you’re done.