I mean…
-
It takes code from a remote source, compiles it into native machine code, and then executes said machine code.
-
It exposes hardware information, sensors, and system statistics to remote actors.
-
It can consume inordinate amounts of resources by mining for cryptocurrency in the background.
-
It keeps trying to get you to change system settings.
-
It’s hidden within the installers of other programs (thanks, Electron).
Out of context, those sure make it sound like malware.
trolololol@lemmy.world 4 months ago
Too big to fail
It’s like saying rich people is eccentric, but us poor can only aim for crazy