minus-squareVojtěch Fošnár@beehaw.orgtoPiracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•How do I know who to trust on cs.rin.ru?linkfedilinkEnglisharrow-up21·5 months agoIt really isn’t, malware still can easily break out as wine nor proton were never designed for isolation in the first place. Easy example is the Z drive giving program access to the whole Linux filesystem. linkfedilink
Vojtěch Fošnár@beehaw.org to Linux@lemmy.mlEnglish · edit-26 months agoRecently started working on a collection of nix-colors adapters, what do you think?plus-squarebeehaw.orgimagemessage-square0fedilinkarrow-up140arrow-down10
arrow-up140arrow-down1imageRecently started working on a collection of nix-colors adapters, what do you think?plus-squarebeehaw.orgVojtěch Fošnár@beehaw.org to Linux@lemmy.mlEnglish · edit-26 months agomessage-square0fedilink
minus-squareVojtěch Fošnár@beehaw.orgtoTechnology@beehaw.org•Cory Doctorow: What Kind of Bubble is AI?linkfedilinkarrow-up2·7 months agoThe same way companies advertise they are certified to be “Privacy respecting”, right? right? linkfedilink
It really isn’t, malware still can easily break out as wine nor proton were never designed for isolation in the first place. Easy example is the Z drive giving program access to the whole Linux filesystem.