Grumpus_Maximus@thelemmy.club to Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.comEnglish · 20 hours agoGrandma we only use torrents for games, or to transfer things.thelemmy.clubimagemessage-square31fedilinkarrow-up1177arrow-down126
arrow-up1151arrow-down1imageGrandma we only use torrents for games, or to transfer things.thelemmy.clubGrumpus_Maximus@thelemmy.club to Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.comEnglish · 20 hours agomessage-square31fedilink
minus-squareCassa@lemmy.blahaj.zonelinkfedilinkEnglisharrow-up1·3 hours agono, these things would try to exploit the program that read them. it’s not a likely attack vector, you need both a malware file, and the right program trying to read it. it might not also be transferrable across different os. so yes, it needs a media player to attack. https://nvd.nist.gov/vuln/detail/CVE-2021-25801 this one f.ex
no, these things would try to exploit the program that read them.
it’s not a likely attack vector, you need both a malware file, and the right program trying to read it. it might not also be transferrable across different os.
so yes, it needs a media player to attack. https://nvd.nist.gov/vuln/detail/CVE-2021-25801 this one f.ex