@[email protected] to [email protected] • 2 years agoYou hold no power here!lemmy.dbzer0.comimagemessage-square25fedilinkarrow-up1555
arrow-up1555imageYou hold no power here!lemmy.dbzer0.com@[email protected] to [email protected] • 2 years agomessage-square25fedilink
minus-square@[email protected]linkfedilink30•2 years agoTo add to the other security conscious comments, even if you wanted to run a VM, there are attacks that escalpe the VM and hit the underlining OS Computers are inherently insecure
minus-square@[email protected]linkfedilink5•2 years agoVM escape is really hard, wine is malware compitable
minus-square@[email protected]linkfedilink4•2 years agoTotally, difficult but by no means impossible. I think we should be cautious and have less hubris when it comes to computer security, that was my point
To add to the other security conscious comments, even if you wanted to run a VM, there are attacks that escalpe the VM and hit the underlining OS
Computers are inherently insecure
deleted by creator
VM escape is really hard, wine is malware compitable
Totally, difficult but by no means impossible. I think we should be cautious and have less hubris when it comes to computer security, that was my point