I have been working on a node that will allow me to track graph usage via a cloud based SQL database, and it got me thinking; aren’t Zero Touch nodes a huge security risk because they can expose a whole lot more sysyem information and access without any ability to look behind the hood? Who knows what those nodes could be transmitting. Am I wrong?
This was raised in this thread too.
i suggest you read it, take it in, and move on
Thought we were overdue for this debate again… always a fun one.
I would stress this over anything else I stated in there: