• pivot_root@lemmy.world
      link
      fedilink
      English
      arrow-up
      6
      ·
      edit-2
      4 months ago

      I mean…

      • It takes code from a remote source, compiles it into native machine code, and then executes said machine code.

      • It exposes hardware information, sensors, and system statistics to remote actors.

      • It can consume inordinate amounts of resources by mining for cryptocurrency in the background.

      • It keeps trying to get you to change system settings.

      • It’s hidden within the installers of other programs (thanks, Electron).

      Out of context, those sure make it sound like malware.

      • trolololol@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        ·
        4 months ago

        Too big to fail

        It’s like saying rich people is eccentric, but us poor can only aim for crazy