this post was submitted on 06 May 2024
194 points (96.6% liked)

cybersecurity

5897 readers
6 users here now

An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!

Community Rules

Enjoy!

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[โ€“] TeddyKila@hexbear.net 7 points 2 years ago (1 children)

L take, taking control away from the user and into a closed source black box leads to breach after breach