1529
Hacking in 1980 vs Hacking in 2024
(lemmy.world)
Post funny things about programming here! (Or just rant about your favourite programming language.)
There's no root login. It's all containers.
The containers still run an OS, have proprietary application code on them, and have memory that probably contains other user's data in it. Not saying it's likely, but containers don't really fix much in the way of gaining privileged access to steal information.
That's why it's containers... in containers
It's like wearing 2 helmets. If 1 helmet is good, imagine the protection of 2 helmets!
So is running it on actual hardware basically rawdoggin?
Wow what an analogy lol