• Neato
    link
    English
    125 days ago

    which probably isn’t as easy as it sounds.

    For commercial uses, yeah. But I kind of assumed terminals provisioned for military use (or use in military operation zones) would require more authentication. Like cryptographic keys (daily, weekly), or 2FA on each use with hardware tokens. Otherwise any captured terminals could simply be used to spy or disrupt Ukranian operations.