https://tinyurl.com/rossmatrixLet's get Right to Repair passed! https://gofund.me/1cba2545👉 https://sneak.berlin/20201112/your-computer-isnt-yours/👉 This v...
A throwback to remind ourselves that apple is terrible for privacy
no, its just an additional attack vector, having the code to inspect makes validating updates much easier and more secure.
I’m evaluating the security of the software I’m using? what are you doing casually excusing a massive security flaw? you must not look either way before crossing the street
Oh really? You read the entire codebase of a project before downloading it, and every time you update it, you go over every single change like you’re the Greek God of code review? Because if you’re not, by your own standards, you’re opening yourself up to “additional attack vectors”
You’re talking cross-purposes. By your reasoning Lemmy or any client you use could be an attack vector - are you diving deep on the servers, their clusters, the network, their content relays, the source code to all of the software from servers to client? See, I doubt you do any of that.
I think all you do is play angels and demons and decide that what you don’t know isn’t important, what you think you know is.
no, its just an additional attack vector, having the code to inspect makes validating updates much easier and more secure.
I’m evaluating the security of the software I’m using? what are you doing casually excusing a massive security flaw? you must not look either way before crossing the street
Oh really? You read the entire codebase of a project before downloading it, and every time you update it, you go over every single change like you’re the Greek God of code review? Because if you’re not, by your own standards, you’re opening yourself up to “additional attack vectors”
You’re talking cross-purposes. By your reasoning Lemmy or any client you use could be an attack vector - are you diving deep on the servers, their clusters, the network, their content relays, the source code to all of the software from servers to client? See, I doubt you do any of that.
I think all you do is play angels and demons and decide that what you don’t know isn’t important, what you think you know is.
You’re the attack vector.
yeah, I’ve considered the security model of lemmy, havent you?
EDIT: Is your argument that nobody should care about security and just be happy with whatever apple sells us?