• simone@lemmy.org
    link
    fedilink
    English
    arrow-up
    1
    ·
    3 days ago

    Projects that have lots of attention and assuming you always compile from source. But someone could easily distribute a binary that is different than the source.

    People should do frequent audits, especially network traffic. I had this one file manager that was kinda like Midnight Commander. Someone on a forum said “check out me app” etc. immediately on launch it made network requests…… why? Anyway, definitely don’t use that for long!!