
1·
4 days agoProjects that have lots of attention and assuming you always compile from source. But someone could easily distribute a binary that is different than the source.
People should do frequent audits, especially network traffic. I had this one file manager that was kinda like Midnight Commander. Someone on a forum said “check out me app” etc. immediately on launch it made network requests…… why? Anyway, definitely don’t use that for long!!
They are watching me.