• chebra@mstdn.io
    link
    fedilink
    arrow-up
    1
    ·
    5 months ago

    @gomp Yes but the point is that it comes from a different place and a different time, so for you to execute a compromised program, it would have to be compromised for a prolonged time without anyone else noticing. You are protected by the crowd. In curl|sh you are not protected from this at all