Themosthighstrange@lemmy.world to Lemmy Shitpost@lemmy.world · 19 hours agoIt's already runninglemmy.worldimagemessage-square76fedilinkarrow-up1749arrow-down115
arrow-up1734arrow-down1imageIt's already runninglemmy.worldThemosthighstrange@lemmy.world to Lemmy Shitpost@lemmy.world · 19 hours agomessage-square76fedilink
minus-squarechatokun@lemmy.dbzer0.comlinkfedilinkarrow-up1·4 hours agoHonestly similar things can be said of windows systems, though there are some exploits that get through. Most do rely on the person launching having admin rights.
Honestly similar things can be said of windows systems, though there are some exploits that get through. Most do rely on the person launching having admin rights.