Comment on How does lemmy implement Auth?

<- View Parent
zedage@lemm.ee ⁨1⁩ ⁨week⁩ ago

There’s a whole multitude of resons that could be argued for both approaches. I prefer this option because:

Why would you not want to trust the developers of each fedi software to hold this information, instead of trusting every instance manager to hold this instead? IMO that is a more vulnerable design choice instead of having a central authority managing user authentication, unless I am missing something?

source
Sort:hotnewtop