lad
link
fedilink
4810M

I’d say that problems mostly come from the need to update dependencies in case of vulnerabilities being discovered. But not every software needs elevated privileges or can become a vector of attack, I guess

If a software is compromised to allow remote code execution, then the situation is pretty dire even without elevated privileges.

Basically your entire userspace will be compromised, and in terms of personal computing that is pretty much all you can lose.

Create a post

Post funny things about programming here! (Or just rant about your favourite programming language.)

Rules:

  • Posts must be relevant to programming, programmers, or computer science.
  • No NSFW content.
  • Jokes must be in good taste. No hate speech, bigotry, etc.
  • 1 user online
  • 159 users / day
  • 317 users / week
  • 704 users / month
  • 2.84K users / 6 months
  • 1 subscriber
  • 1.57K Posts
  • 34.8K Comments
  • Modlog