petsoi@discuss.tchncs.de to Linux@lemmy.ml · edit-28 months agoimmich v1.124.0 releasedgithub.comexternal-linkmessage-square28linkfedilinkarrow-up1145arrow-down12file-text
arrow-up1143arrow-down1external-linkimmich v1.124.0 releasedgithub.competsoi@discuss.tchncs.de to Linux@lemmy.ml · edit-28 months agomessage-square28linkfedilinkfile-text
minus-squareNibodhika@lemmy.worldlinkfedilinkarrow-up2·8 months agoAbsolutely, and in most cases (while one shouldn’t rely on this since escaping a docker container is sometimes doable) even if there is a security breach the invader would be limited to the service image, which would get recreated upon restart.
Absolutely, and in most cases (while one shouldn’t rely on this since escaping a docker container is sometimes doable) even if there is a security breach the invader would be limited to the service image, which would get recreated upon restart.