▲ | dabockster 4 days ago | |
For this kind of infrastructure, some kind of real world verification may be necessary as well. Like having human ran phone verification (not AI, an actual call center) using information intentionally kept offline for securing more widespread and mission critical packages. They can't pwn what they can't find online. |