ElCanut@jlai.lu to linuxmemes@lemmy.world · 1 year agoOh no ...jlai.luimagemessage-square276fedilinkarrow-up11.43Karrow-down194
arrow-up11.33Karrow-down1imageOh no ...jlai.luElCanut@jlai.lu to linuxmemes@lemmy.world · 1 year agomessage-square276fedilink
minus-squareBaut [she/her] auf.@lemmy.blahaj.zonelinkfedilinkarrow-up2arrow-down1·1 year agoX’ architecture is insecure. There’s no isolation between windows, and each process can spy on your input. That’s just one example. Wayland is necessary.
minus-squareExLisper@linux.communitylinkfedilinkEnglisharrow-up3·1 year agoYet no known active exploits use this insecure architecture to cause actual harm. It’s just another FUD.
minus-squareBaut [she/her] auf.@lemmy.blahaj.zonelinkfedilinkarrow-up1·1 year agoI’d hardly call that an exploit. There’s no protection.
X’ architecture is insecure. There’s no isolation between windows, and each process can spy on your input. That’s just one example.
Wayland is necessary.
Yet no known active exploits use this insecure architecture to cause actual harm. It’s just another FUD.
I’d hardly call that an exploit. There’s no protection.