Possibly linux@lemmy.zip to linuxmemes@lemmy.worldEnglish · 1 month agoIt is called 🍷lemmy.zipimagemessage-square74fedilinkarrow-up1550arrow-down119
arrow-up1531arrow-down1imageIt is called 🍷lemmy.zipPossibly linux@lemmy.zip to linuxmemes@lemmy.worldEnglish · 1 month agomessage-square74fedilink
minus-squarePetter1@lemm.eelinkfedilinkarrow-up5·1 month agoIt’s more about security if I recall correctly
minus-squareacockworkorange@mander.xyzlinkfedilinkarrow-up2·1 month agoHow so? Is there a way for malicious code to start injecting itself into calls to 127.0.0.1?
minus-squarePetter1@lemm.eelinkfedilinkarrow-up3·edit-21 month agoSorry, I am not an expert myself, but I think there are some recourses about that in the internet Or, this file on x.org: “But the X protocol is still unsecure by design…” https://www.x.org/wiki/Events/XDC2014/XDC2014DodierPeresSecurity/xorg-talk.pdf
minus-squareacockworkorange@mander.xyzlinkfedilinkarrow-up4·1 month agoYeah, to send it naked over the wire would be nuts, which is why everybody uses SSH. But unless there’s insecurity within the computer, that’s a moot point.
It’s more about security if I recall correctly
How so? Is there a way for malicious code to start injecting itself into calls to 127.0.0.1?
Sorry, I am not an expert myself, but I think there are some recourses about that in the internet
Or, this file on x.org:
https://www.x.org/wiki/Events/XDC2014/XDC2014DodierPeresSecurity/xorg-talk.pdf
Yeah, to send it naked over the wire would be nuts, which is why everybody uses SSH. But unless there’s insecurity within the computer, that’s a moot point.