I would need a little context for the question.
I assume you mean for people and goods?
I would say it depends on who detects the information, for what purpose, who holds the information and who provides authentication, and how would we prevent their use and abuse of it all?
Source date (UTC): 2024-09-14 20:15:18 UTC
Original post: https://twitter.com/i/web/status/1835049705933303950
Reply addressees: @RussellJohnston
Replying to: https://twitter.com/i/web/status/1835045133315981488
Leave a Reply