Other than the security afforded by connecting to the network itself, we should implement an additional layer of security around commanding itself. In addition to mitigating the possibility of some intrepid young Kansas hacker modifying the show to suit his desires, it would also permit users on the network who can view status and telemetry but not actually command, which might be handy.
Other than the security afforded by connecting to the network itself, we should implement an additional layer of security around commanding itself. In addition to mitigating the possibility of some intrepid young Kansas hacker modifying the show to suit his desires, it would also permit users on the network who can view status and telemetry but not actually command, which might be handy.