@[email protected] to [email protected] • 8 months agoDebian security amirite?lemmy.worldmessage-square72fedilinkarrow-up1996
arrow-up1996imageDebian security amirite?lemmy.world@[email protected] to [email protected] • 8 months agomessage-square72fedilink
minus-squarePossibly linuxlinkfedilinkEnglish13•edit-28 months agoUntil they are attacked… Not to mention a lot of the time the “attack” is from the company themselves. Just look at the Meta malware as an example
minus-squarePossibly linuxlinkfedilinkEnglish4•8 months agoThe VPN that performed a man in the middle attack to get data from other apps
minus-square@[email protected]linkfedilink5•8 months agoThe sony CD rootkit comes to mind https://en.m.wikipedia.org/wiki/Sony_BMG_copy_protection_rootkit_scandal
Until they are attacked…
Not to mention a lot of the time the “attack” is from the company themselves. Just look at the Meta malware as an example
What is this?
The VPN that performed a man in the middle attack to get data from other apps
The sony CD rootkit comes to mind https://en.m.wikipedia.org/wiki/Sony_BMG_copy_protection_rootkit_scandal