@Edent Real name policy always feels beyond impractical as you rightly say. But in this case an added complexity: what even is ‘critical infrastructure’? It seems like you can become critical infrastructure through someone else deciding to depend on your software, and then you have to comply with their real name policy against your will?
And which contributors would have to comply? Current, or all former? Only the latter would be sufficient, but would also be unworkable.