Sounds dangerous :-) -- but presumably we could do it sanely? Requiring keys helps. I'm open to thoughts, but I know for instance spread uses ssh :-)
Sounds dangerous :-) -- but presumably we could do it sanely? Requiring keys helps. I'm open to thoughts, but I know for instance spread uses ssh :-)