I would need a little context for the question. I assume you mean for people and

I would need a little context for the question.
I assume you mean for people and goods?
I would say it depends on who detects the information, for what purpose, who holds the information and who provides authentication, and how would we prevent their use and abuse of it all?


Source date (UTC): 2024-09-14 20:15:18 UTC

Original post: https://twitter.com/i/web/status/1835049705933303950

Reply addressees: @RussellJohnston

Replying to: https://twitter.com/i/web/status/1835045133315981488

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *