petsoi@discuss.tchncs.de to Linux@lemmy.ml · edit-22 months agoimmich v1.124.0 releasedgithub.comexternal-linkmessage-square25fedilinkarrow-up1136arrow-down12file-text
arrow-up1134arrow-down1external-linkimmich v1.124.0 releasedgithub.competsoi@discuss.tchncs.de to Linux@lemmy.ml · edit-22 months agomessage-square25fedilinkfile-text
minus-squareNibodhika@lemmy.worldlinkfedilinkarrow-up2·2 months agoAbsolutely, and in most cases (while one shouldn’t rely on this since escaping a docker container is sometimes doable) even if there is a security breach the invader would be limited to the service image, which would get recreated upon restart.
Absolutely, and in most cases (while one shouldn’t rely on this since escaping a docker container is sometimes doable) even if there is a security breach the invader would be limited to the service image, which would get recreated upon restart.