TxzK@lemmy.zip to Programmer Humor@lemmy.ml · 2 years agoHappened to me multiple timeslemmy.zipimagemessage-square63fedilinkarrow-up191arrow-down11 cross-posted to: programmer_humor@programming.dev
arrow-up190arrow-down1imageHappened to me multiple timeslemmy.zipTxzK@lemmy.zip to Programmer Humor@lemmy.ml · 2 years agomessage-square63fedilink cross-posted to: programmer_humor@programming.dev
minus-squarelad@programming.devlinkfedilinkarrow-up4·2 years agoI’d say that problems mostly come from the need to update dependencies in case of vulnerabilities being discovered. But not every software needs elevated privileges or can become a vector of attack, I guess
I’d say that problems mostly come from the need to update dependencies in case of vulnerabilities being discovered. But not every software needs elevated privileges or can become a vector of attack, I guess