this post was submitted on 04 Apr 2024
1020 points (98.8% liked)

linuxmemes

21304 readers
1101 users here now

Hint: :q!


Sister communities:


Community rules (click to expand)

1. Follow the site-wide rules

2. Be civil
  • Understand the difference between a joke and an insult.
  • Do not harrass or attack members of the community for any reason.
  • Leave remarks of "peasantry" to the PCMR community. If you dislike an OS/service/application, attack the thing you dislike, not the individuals who use it. Some people may not have a choice.
  • Bigotry will not be tolerated.
  • These rules are somewhat loosened when the subject is a public figure. Still, do not attack their person or incite harrassment.
  • 3. Post Linux-related content
  • Including Unix and BSD.
  • Non-Linux content is acceptable as long as it makes a reference to Linux. For example, the poorly made mockery of sudo in Windows.
  • No porn. Even if you watch it on a Linux machine.
  • 4. No recent reposts
  • Everybody uses Arch btw, can't quit Vim, and wants to interject for a moment. You can stop now.
  •  

    Please report posts and comments that break these rules!


    Important: never execute code or follow advice that you don't understand or can't verify, especially here. The word of the day is credibility. This is a meme community -- even the most helpful comments might just be shitposts that can damage your system. Be aware, be smart, don't fork-bomb your computer.

    founded 1 year ago
    MODERATORS
     
    you are viewing a single comment's thread
    view the rest of the comments
    [–] cley_faye@lemmy.world 78 points 7 months ago (3 children)

    Because they want to "protect" you from "yourself". Imagine, you could scrape your own data that you can already see.

    I'd be really worried if the security of server operation for my bank depended on the client-side. But playing devils advocate, some people will most likely point out that a root exploit on a phone may be unintentional and used to spy on people, to which I answer:

    • show me a big scary box where I can "accept the risk" and move on
    • keep in mind that if I am root on my phone, I can hide the fact that I am root on my phone and you'll be none the wiser

    Currently, option 2 is in effect, sadly.

    [–] eluvatar@programming.dev 21 points 7 months ago (1 children)

    The issue with option one is that scammers get old (or not technical) people to do stuff when they don't know what they're doing and click the box not knowing what they just did. So yes very frequently they need to protect people from themselves because they're dumb, but I still expect banks to do business with those dumb people, sooo.... Option 2 it is.

    [–] EvolvedTurtle@lemmy.world 21 points 7 months ago (3 children)

    Ok but also What tech illiterate person roots there phone

    [–] trxxruraxvr@lemmy.world 14 points 7 months ago

    That's where this part becomes relevant

    a root exploit on a phone may be unintentional and used to spy on people

    [–] joel_feila@lemmy.world 1 points 7 months ago

    well you can buy a rooted phone that runs some thing like lineage preinstalled.

    [–] iso@lemmy.dbzer0.com -2 points 7 months ago

    I think I just figured it out, hang on with me.

    It'd be the tech literate person in the family. The nephew that's working as a programmer or something like that. Now, if that nephew has some interest in stealing their uncles money, they now have access to their bank account through a freely rooted phone.

    This gives them a lot of options, which I don't have to explain.

    Given that a lot of scams actually happen between presumed family and friends...

    Yeah I kinda get why banks are doing this

    [–] kalpol@lemm.ee 2 points 7 months ago (1 children)

    Option 2 is not long for this world

    [–] cley_faye@lemmy.world 9 points 7 months ago

    As long as we'll have control over the software, it'll be there. If we reach the point were you're not allowed to own computers, we'll have bigger problem.