• pivot_root@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    edit-2
    2 months ago

    I mean…

    • It takes code from a remote source, compiles it into native machine code, and then executes said machine code.

    • It exposes hardware information, sensors, and system statistics to remote actors.

    • It can consume inordinate amounts of resources by mining for cryptocurrency in the background.

    • It keeps trying to get you to change system settings.

    • It’s hidden within the installers of other programs (thanks, Electron).

    Out of context, those sure make it sound like malware.

    • trolololol@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      2 months ago

      Too big to fail

      It’s like saying rich people is eccentric, but us poor can only aim for crazy