• douglasg14b@programming.dev
    link
    fedilink
    English
    arrow-up
    0
    ·
    4 months ago

    Not necessarily. There are many paths to exfiltrated data that don’t require privileged access, and can be exploited through vulnerabilities in other applications.