Warning: Some posts on this platform may contain adult material intended for mature audiences only. Viewer discretion is advised. By clicking ‘Continue’, you confirm that you are 18 years or older and consent to viewing explicit content.
X’ architecture is insecure. There’s no isolation between windows, and each process can spy on your input. That’s just one example.
Wayland is necessary.
X’ architecture is insecure. There’s no isolation between windows, and each process can spy on your input. That’s just one example.
Wayland is necessary.
Yet no known active exploits use this insecure architecture to cause actual harm. It’s just another FUD.
I’d hardly call that an exploit. There’s no protection.