• BioMyth@lemmy.mlEnglish
    181·
    1 month ago

    While this is a risk, it is only a real risk if the system is already exploited for regular user access. Or if there is an untrustworthy user of the system. So for most, it is not a major concern.