1) Using a website which has had its server code compromised (slack).
2) Installing and using an application which has had its code compromised (maybe also slack).
The installed application is going to have more access and potential to damage your system and to compromise your data. There's not really anything more to it. One's in a browser sandbox and limited by browser capability, the other can do literally anything it wants.
1) Using a website which has had its server code compromised (slack).
2) Installing and using an application which has had its code compromised (maybe also slack).
The installed application is going to have more access and potential to damage your system and to compromise your data. There's not really anything more to it. One's in a browser sandbox and limited by browser capability, the other can do literally anything it wants.