petsoi@discuss.tchncs.de to Linux@lemmy.ml · edit-224 days agoimmich v1.124.0 releasedgithub.comexternal-linkmessage-square28fedilinkarrow-up1144arrow-down12file-text
arrow-up1142arrow-down1external-linkimmich v1.124.0 releasedgithub.competsoi@discuss.tchncs.de to Linux@lemmy.ml · edit-224 days agomessage-square28fedilinkfile-text
minus-squareNibodhika@lemmy.worldlinkfedilinkarrow-up2·24 days agoAbsolutely, and in most cases (while one shouldn’t rely on this since escaping a docker container is sometimes doable) even if there is a security breach the invader would be limited to the service image, which would get recreated upon restart.
Absolutely, and in most cases (while one shouldn’t rely on this since escaping a docker container is sometimes doable) even if there is a security breach the invader would be limited to the service image, which would get recreated upon restart.