Application vs. Database: Where Should Permissions Live? | Dark Hacker News