• heeplr@feddit.de
    link
    fedilink
    English
    arrow-up
    5
    ·
    1 year ago

    Just avoid running random binaries from untrusted sources; prefer open source

    So much this.

    And not only with “shady” software, since binaries can be replaced without the original trusted source being aware of. Supply chain attacks are real.