• douglasg14b
    link
    fedilink
    English
    arrow-up
    2
    ·
    5 months ago

    Not necessarily. There are many paths to exfiltrated data that don’t require privileged access, and can be exploited through vulnerabilities in other applications.