• pivot_root@lemmy.world
        link
        fedilink
        English
        arrow-up
        5
        ·
        edit-2
        6 months ago

        I mean…

        • It takes code from a remote source, compiles it into native machine code, and then executes said machine code.

        • It exposes hardware information, sensors, and system statistics to remote actors.

        • It can consume inordinate amounts of resources by mining for cryptocurrency in the background.

        • It keeps trying to get you to change system settings.

        • It’s hidden within the installers of other programs (thanks, Electron).

        Out of context, those sure make it sound like malware.

        • trolololol@lemmy.world
          link
          fedilink
          English
          arrow-up
          4
          ·
          6 months ago

          Too big to fail

          It’s like saying rich people is eccentric, but us poor can only aim for crazy