• 4 Posts
  • 807 Comments
Joined 2 years ago
cake
Cake day: April 13th, 2024

help-circle





  • EntropywinstoTechnology*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    1
    ·
    8 months ago

    I was reading someone else’s explanation and they said it’s the equivalent of every computer possibly having a backdoor because there is code in a computer that a bad actor can use. There are extra commands that could possibly be used for a backdoor if a malicious actor found a way to use those bits of code. It’s much less oh here is a security vulnerability that is being used and more of a if a robber breaks into our house which is possible they will rob us situation.