ElCanut@jlai.lu to linuxmemes@lemmy.world · 1 year agoOh no ...jlai.luimagemessage-square337fedilinkarrow-up11.73Karrow-down1113
arrow-up11.62Karrow-down1imageOh no ...jlai.luElCanut@jlai.lu to linuxmemes@lemmy.world · 1 year agomessage-square337fedilink
minus-squareBaut auf. she/her@lemmy.blahaj.zonelinkfedilinkarrow-up2arrow-down1·1 year agoX’ architecture is insecure. There’s no isolation between windows, and each process can spy on your input. That’s just one example. Wayland is necessary.
minus-squareExLisper@linux.communitylinkfedilinkEnglisharrow-up3·1 year agoYet no known active exploits use this insecure architecture to cause actual harm. It’s just another FUD.
minus-squareBaut auf. she/her@lemmy.blahaj.zonelinkfedilinkarrow-up1·1 year agoI’d hardly call that an exploit. There’s no protection.
X’ architecture is insecure. There’s no isolation between windows, and each process can spy on your input. That’s just one example.
Wayland is necessary.
Yet no known active exploits use this insecure architecture to cause actual harm. It’s just another FUD.
I’d hardly call that an exploit. There’s no protection.