Quote Originally Posted by Mosha View Post
Or we can just not go down the path of using a system that can be easily worked around and abused by malicious actors. I like that idea more.
Feel free to explain how it can be "easily abused." Just saying it can be easily abused is not proof of how it can being easily abused.

I can't help but notice nobody else has bothered coming up with any suggestions. Just a bunch of contrarian garbage with zero evidence of how my entire suggestion can be abused.