GEGL guy here (also OP), I don't know what happened to the post I made a few weeks ago, maybe it never posted but in July 2023 it was discovered that tracker's library `libcue` had an active exploit that allowed arbitrary code execution. Which basically means a cracker can run any code on your system they want.
https://security.gentoo.org/glsa/202310-10https://desuarchive.org/g/thread/100884806/#100894578Followed by a unpublished discovery of glowies using tracker3 metadata to spy on users once they hack a machine. This suggest that glowies were involved in the development of tracker3 and intentionally made tracker3 vulnerable because it does two things 1. collect meta data for them, 2. run arbitrary code. Its fixed now but for years they could have exploited this and I believe strongly that glowies were the ones who made the exploits in tracker3.
Anyhow, why are all images here broken?