Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

You’re limiting your view of feature flags to a subset of their potential. Also, authorization schemes like attribute based access control (ABAC) can use any arbitrarily dynamic values from the current context. The two concepts overlap immensely.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: