security risk: takes unknown bytes from some web address and pipes them through an interpreter
loss of control regarding installation directory
I'm still inclined to use this piping installation approach, but maybe we should make this decision process more transparent, and not imply that it is globally a prudent installation method
I'm still inclined to use this piping installation approach, but maybe we should make this decision process more transparent, and not imply that it is globally a prudent installation method