• Cypher@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    8 months ago

    You’re talking about device vulnerabilities that get patched

    Patching out zero days takes time.

    it’s equally possible to encounter these exploits with plaintext URLs

    Yes which is why I clearly stated that following URLs from any unknown sources carries risk.

    The difference is that due to menus being a point of payment they have a greater incentive for abuse.

    • gila@lemm.ee
      link
      fedilink
      English
      arrow-up
      0
      ·
      8 months ago

      So we shouldn’t use smartphone features if they could potentially have exploits? With this logic you shouldn’t have a phone.

      • hemko@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        1
        ·
        edit-2
        8 months ago

        We shouldn’t replace perfectly good solutions with unreliable, cumbersome, insecure, annoying shitty tech just because.

        • lolcatnip@reddthat.com
          link
          fedilink
          English
          arrow-up
          0
          ·
          8 months ago

          Thinking that simply visiting a web site for a business you’ve already decided to patronize is dangerous is some serious boomer logic.

          • hemko@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            1
            ·
            8 months ago

            If we only focus on the security part, how the do you know it’s even their site you’re visiting? Often those qr codes are just stickers on table, trivial to slap a new one there

            But it also adds a lot of annoyance for customers who came to eat food, not doomscroll on their fucking mobile phone