• 3 Posts
  • 231 Comments
Joined 1 year ago
cake
Cake day: June 24th, 2023

help-circle
















  • Most malware is writen for Windows, but Linux malware exists, and has been found in the wild. The most common infection method, like with windows is running a trojan, theoretically things like browser exploits could also be used, but these are unlikely unless you are a high profile target like a head of state or CEO.

    I would personaly be much more worried about someone evesdropping through my microphone. All they would get from my camera is my face and some glances of the room my computer is in, but my microphone would reveal all sorts of private conversations.


  • GNU is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX[Maximum call stack size exceeded]