• @douglasg14b
    link
    English
    225 days ago

    Not necessarily. There are many paths to exfiltrated data that don’t require privileged access, and can be exploited through vulnerabilities in other applications.