<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: crytp0-nerd</title>
    <description>The latest articles on DEV Community by crytp0-nerd (@crypt0-nerd).</description>
    <link>https://dev.to/crypt0-nerd</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3929431%2F5d0984ef-7950-4b6c-8f26-cacb87351463.png</url>
      <title>DEV Community: crytp0-nerd</title>
      <link>https://dev.to/crypt0-nerd</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/crypt0-nerd"/>
    <language>en</language>
    <item>
      <title>Is "good enough" auth hiding a bigger security problem?</title>
      <dc:creator>crytp0-nerd</dc:creator>
      <pubDate>Wed, 13 May 2026 13:50:40 +0000</pubDate>
      <link>https://dev.to/crypt0-nerd/is-decentralised-iam-actually-useful-3d4n</link>
      <guid>https://dev.to/crypt0-nerd/is-decentralised-iam-actually-useful-3d4n</guid>
      <description>&lt;p&gt;been following a small startup in sydney thats working on decentralised IAM / security fabric stuff, and i think im becoming a bit of a fan of the idea.&lt;/p&gt;

&lt;p&gt;what im trying to understand is why more people arent excited about this kind of thing, especially now that software is getting built faster with ai and security feels more chaotic than ever.&lt;/p&gt;

&lt;p&gt;most apps still end up with a few scary central points of trust. auth provider, secrets manager, sessions, recovery flows, admin access, user db, that kind of thing.&lt;/p&gt;

&lt;p&gt;if one of those gets breached or misconfigured, the blast radius can be pretty ugly.&lt;/p&gt;

&lt;p&gt;the idea i find interesting is not really decentralisation for the sake of it. its more like, can we avoid having one big pile of sensitive stuff sitting somewhere in the first place?&lt;/p&gt;

&lt;p&gt;i can imagine a few use cases where this might matter:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;apps where users own their data and choose what gets shared&lt;/li&gt;
&lt;li&gt;health / finance / legal apps with sensitive user data&lt;/li&gt;
&lt;li&gt;identity and access management&lt;/li&gt;
&lt;li&gt;key management / signing flows&lt;/li&gt;
&lt;li&gt;recovery flows where one admin or provider shouldnt have too much power&lt;/li&gt;
&lt;li&gt;ai-built apps where people might ship faster than they understand the security model&lt;/li&gt;
&lt;li&gt;apps that want security without holding all the sensitive stuff themselves&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;but i can also see why people might not bother. existing tools are pretty mature, and adding another layer to auth/security is not exactly something devs do for fun.&lt;/p&gt;

&lt;p&gt;the questions i keep coming back to are:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;who runs the nodes?&lt;/li&gt;
&lt;li&gt;what happens if they go down?&lt;/li&gt;
&lt;li&gt;how does recovery work?&lt;/li&gt;
&lt;li&gt;does this make debugging painful?&lt;/li&gt;
&lt;li&gt;is the latency noticeable?&lt;/li&gt;
&lt;li&gt;does it reduce trust, or just move trust somewhere else?&lt;/li&gt;
&lt;li&gt;is Keycloak/Auth0/Okta/KMS already good enough for most teams?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;i think the dx is probably the make or break part. if normal devs cant understand it, debug it, or integrate it without pain, it probably wont matter how good the security model is.&lt;/p&gt;

&lt;p&gt;curious what people think. are there real use cases where decentralised IAM/security fabric makes sense, or is it just too much complexity for most apps?&lt;/p&gt;

&lt;p&gt;also keen to hear what use cases im not thinking of, because im probably missing some obvious ones.&lt;/p&gt;

</description>
      <category>discuss</category>
      <category>security</category>
      <category>software</category>
      <category>webdev</category>
    </item>
  </channel>
</rss>
