72
you are viewing a single comment's thread
view the rest of the comments
[-] hoshikarakitaridia@lemmy.world 4 points 2 hours ago

Yeah from my intuition it sounds like this file serves as a makeshift firewall / proxy. Allowing software to override it kinda makes this weak and basically useless for a lot of purposes.

this post was submitted on 06 Apr 2026
72 points (100.0% liked)

cybersecurity

6023 readers
83 users here now

An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!

Community Rules

Enjoy!

founded 2 years ago
MODERATORS