Saw one source saying they managed to use ZL to extract the /etc/shadow file from a gnu/nix OS via it's web browser, it reportedly took them 24hrs to do so and presumably javascript was used for this. Who spends 24 straight hours dorking around on a website normally anyway and with js enabled too ? Which of course any passwords they get are hashed anyway, while yeah depending on password strength may be cracked. Still leaves much they'd need to do to find and connect to that system again(would seem highly unlikely truthfully), even if they've successfully gotten ahold of creds for it. Arghhhh. Again ... really think this just amounts to yet more online hazards, nothing more or less. At least for vast majority of desktop nixers. Outside of a multiuser setting can still see where this could make malicious hackers lives easier if they can get a foothold onto a users system. Though that still requires that targeted user doing or having done something stoopid for that to be possible. As usual believe it's more of a concern for M$ users in that context, as they're dependent upon M$ to great extent and clearly never an ideal position to be in. Still even for M$'s users, just one more of a TON of other exploits and easy button solution for this threat = AMD.
