• lad@programming.dev
    link
    fedilink
    arrow-up
    44
    ·
    9 months ago

    I’d say that problems mostly come from the need to update dependencies in case of vulnerabilities being discovered. But not every software needs elevated privileges or can become a vector of attack, I guess

    • baseless_discourse@mander.xyz
      link
      fedilink
      arrow-up
      9
      ·
      9 months ago

      If a software is compromised to allow remote code execution, then the situation is pretty dire even without elevated privileges.

      Basically your entire userspace will be compromised, and in terms of personal computing that is pretty much all you can lose.