TxzK@lemmy.zip to Programmer Humor@lemmy.ml · 10 months agoHappened to me multiple timeslemmy.zipexternal-linkmessage-square207fedilinkarrow-up11.98Karrow-down117 cross-posted to: [email protected]
arrow-up11.96Karrow-down1external-linkHappened to me multiple timeslemmy.zipTxzK@lemmy.zip to Programmer Humor@lemmy.ml · 10 months agomessage-square207fedilink cross-posted to: [email protected]
minus-squarelad@programming.devlinkfedilinkarrow-up48·10 months agoI’d say that problems mostly come from the need to update dependencies in case of vulnerabilities being discovered. But not every software needs elevated privileges or can become a vector of attack, I guess
minus-squarebaseless_discourse@mander.xyzlinkfedilinkarrow-up9·10 months agoIf a software is compromised to allow remote code execution, then the situation is pretty dire even without elevated privileges. Basically your entire userspace will be compromised, and in terms of personal computing that is pretty much all you can lose.
I’d say that problems mostly come from the need to update dependencies in case of vulnerabilities being discovered. But not every software needs elevated privileges or can become a vector of attack, I guess
If a software is compromised to allow remote code execution, then the situation is pretty dire even without elevated privileges.
Basically your entire userspace will be compromised, and in terms of personal computing that is pretty much all you can lose.