petsoi@discuss.tchncs.de to Linux@lemmy.ml · edit-227 days agoimmich v1.124.0 releasedgithub.comexternal-linkmessage-square26fedilinkarrow-up1135arrow-down12file-text
arrow-up1133arrow-down1external-linkimmich v1.124.0 releasedgithub.competsoi@discuss.tchncs.de to Linux@lemmy.ml · edit-227 days agomessage-square26fedilinkfile-text
minus-squareNibodhika@lemmy.worldlinkfedilinkarrow-up2·27 days agoAbsolutely, and in most cases (while one shouldn’t rely on this since escaping a docker container is sometimes doable) even if there is a security breach the invader would be limited to the service image, which would get recreated upon restart.
Absolutely, and in most cases (while one shouldn’t rely on this since escaping a docker container is sometimes doable) even if there is a security breach the invader would be limited to the service image, which would get recreated upon restart.