Grumpus_Maximus@thelemmy.club to Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.comEnglish · 1 day agoGrandma we only use torrents for games, or to transfer things.thelemmy.clubimagemessage-square32fedilinkarrow-up1182
arrow-up1182imageGrandma we only use torrents for games, or to transfer things.thelemmy.clubGrumpus_Maximus@thelemmy.club to Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.comEnglish · 1 day agomessage-square32fedilink
minus-squareCassa@lemmy.blahaj.zonelinkfedilinkEnglisharrow-up2·10 hours agono, these things would try to exploit the program that read them. it’s not a likely attack vector, you need both a malware file, and the right program trying to read it. it might not also be transferrable across different os. so yes, it needs a media player to attack. https://nvd.nist.gov/vuln/detail/CVE-2021-25801 this one f.ex
no, these things would try to exploit the program that read them.
it’s not a likely attack vector, you need both a malware file, and the right program trying to read it. it might not also be transferrable across different os.
so yes, it needs a media player to attack. https://nvd.nist.gov/vuln/detail/CVE-2021-25801 this one f.ex