Please ask how someone gets commit access to the Core repo and what would be required to commit some malicious code. Additionally talking about how nodes don’t have to update, updates aren’t pushed, etc. would be helpful.

Reply to this note

Please Login to reply.

Discussion

No replies yet.