![](https://lemmy.world/pictrs/image/71acba85-2395-4ea5-90f1-368b192dbcba.jpeg)
![](https://fry.gs/pictrs/image/c6832070-8625-4688-b9e5-5d519541e092.png)
More importantly, does the attacker need physical access to the computer or can this be performed over the Internet/local network?
More importantly, does the attacker need physical access to the computer or can this be performed over the Internet/local network?
Another related question. Is the creator of Lemmy also the creator of torrents-csv? I ask because their dockerhub page hosts torrents-csv images as well as the lemmy one.
Here’s some flame bait:
Why would you want to listen to your music in this inferior format? I get it if there aren’t any modern recordings or quality transfers but to actually sit down and enjoy the low signal to noise ratio of a record just boggles the mind.
Private tracker and seed requirements is the reason that comes to mind for me. Back when I was on a private tracker some 20 years ago I would get the torrent file and the actual data from a friend so I could seed it without having downloaded it.
Do these 3rd party apps let you get rid of Shorts? I absolutely despise accidentally clicking on Shorts and would prefer if they actually stayed in the Shorts section so this doesn’t happen on my Home feed.
I’ll answer because I found the information. It appears that the attacker would need to rely on physical access to the machine OR another exploit that lets them access the computer remotely.