• pivot_root@lemmy.world
          link
          fedilink
          English
          arrow-up
          5
          ·
          edit-2
          3 months ago

          I mean…

          • It takes code from a remote source, compiles it into native machine code, and then executes said machine code.

          • It exposes hardware information, sensors, and system statistics to remote actors.

          • It can consume inordinate amounts of resources by mining for cryptocurrency in the background.

          • It keeps trying to get you to change system settings.

          • It’s hidden within the installers of other programs (thanks, Electron).

          Out of context, those sure make it sound like malware.

          • trolololol@lemmy.world
            link
            fedilink
            English
            arrow-up
            4
            ·
            3 months ago

            Too big to fail

            It’s like saying rich people is eccentric, but us poor can only aim for crazy