For commercial uses, yeah. But I kind of assumed terminals provisioned for military use (or use in military operation zones) would require more authentication. Like cryptographic keys (daily, weekly), or 2FA on each use with hardware tokens. Otherwise any captured terminals could simply be used to spy or disrupt Ukranian operations.
For commercial uses, yeah. But I kind of assumed terminals provisioned for military use (or use in military operation zones) would require more authentication. Like cryptographic keys (daily, weekly), or 2FA on each use with hardware tokens. Otherwise any captured terminals could simply be used to spy or disrupt Ukranian operations.