TxzK@lemmy.zip to Programmer Humor@lemmy.ml · 2 years agoHappened to me multiple timeslemmy.zipimagemessage-square29fedilinkarrow-up126arrow-down10 cross-posted to: programmer_humor@programming.dev
arrow-up126arrow-down1imageHappened to me multiple timeslemmy.zipTxzK@lemmy.zip to Programmer Humor@lemmy.ml · 2 years agomessage-square29fedilink cross-posted to: programmer_humor@programming.dev
minus-squarelad@programming.devlinkfedilinkarrow-up1·2 years agoI’d say that problems mostly come from the need to update dependencies in case of vulnerabilities being discovered. But not every software needs elevated privileges or can become a vector of attack, I guess
I’d say that problems mostly come from the need to update dependencies in case of vulnerabilities being discovered. But not every software needs elevated privileges or can become a vector of attack, I guess