• anyhow2503@lemmy.world
    link
    fedilink
    arrow-up
    1
    ·
    5 hours ago

    A threat actor with code execution on a Linux desktop immediately has access to the filesystem and can do whatever anyway, in practice

    No.