@[email protected] to [email protected] • 1 year agoDebian security amirite?lemmy.worldimagemessage-square74fedilinkarrow-up11K
arrow-up11KimageDebian security amirite?lemmy.world@[email protected] to [email protected] • 1 year agomessage-square74fedilink
minus-squarePossibly linuxlinkfedilinkEnglish13•edit-21 year agoUntil they are attacked… Not to mention a lot of the time the “attack” is from the company themselves. Just look at the Meta malware as an example
minus-squarePossibly linuxlinkfedilinkEnglish4•1 year agoThe VPN that performed a man in the middle attack to get data from other apps
minus-square@[email protected]linkfedilink6•1 year agoThe sony CD rootkit comes to mind https://en.m.wikipedia.org/wiki/Sony_BMG_copy_protection_rootkit_scandal
Until they are attacked…
Not to mention a lot of the time the “attack” is from the company themselves. Just look at the Meta malware as an example
What is this?
The VPN that performed a man in the middle attack to get data from other apps
The sony CD rootkit comes to mind https://en.m.wikipedia.org/wiki/Sony_BMG_copy_protection_rootkit_scandal