The centerpiece of the new [security] architecture is … services and applications. Like a trusted assistant with … no longer need to be compiled with cryptographic … [p. 3] Following the lead of the SSH agent … [ref] … [factotum] responsible for holding and using the user's keys.
Google-1
Google-2
Copyright clearance needed for quotation.