I love public/private key non-centralized authentication. Not enough of it, we always say.

Reply to this note

Please Login to reply.

Discussion

Absolutely. The old method was just a result of using Jam's authentication method. This is being rebuilt from the ground up.