• @anyhow2503
    link
    13 hours ago

    A threat actor with code execution on a Linux desktop immediately has access to the filesystem and can do whatever anyway, in practice

    No.