• @douglasg14b@programming.dev
      link
      fedilink
      English
      26 months ago

      Not necessarily. There are many paths to exfiltrated data that don’t require privileged access, and can be exploited through vulnerabilities in other applications.