Please ask how someone gets commit access to the Core repo and what would be required to commit some malicious code. Additionally talking about how nodes don’t have to update, updates aren’t pushed, etc. would be helpful.
Please ask how someone gets commit access to the Core repo and what would be required to commit some malicious code. Additionally talking about how nodes don’t have to update, updates aren’t pushed, etc. would be helpful.
No replies yet.