![](https://lemmy.world/pictrs/image/71acba85-2395-4ea5-90f1-368b192dbcba.jpeg)
![](https://fry.gs/pictrs/image/c6832070-8625-4688-b9e5-5d519541e092.png)
23·
7 months agoMore importantly, does the attacker need physical access to the computer or can this be performed over the Internet/local network?
More importantly, does the attacker need physical access to the computer or can this be performed over the Internet/local network?
Another related question. Is the creator of Lemmy also the creator of torrents-csv? I ask because their dockerhub page hosts torrents-csv images as well as the lemmy one.
Here’s some flame bait:
Why would you want to listen to your music in this inferior format? I get it if there aren’t any modern recordings or quality transfers but to actually sit down and enjoy the low signal to noise ratio of a record just boggles the mind.
I’ll answer because I found the information. It appears that the attacker would need to rely on physical access to the machine OR another exploit that lets them access the computer remotely.