They provide a simple, out of the box ,turnkey solution with a common UI to configure and manage the whole thing. Out of the box it covers most situations someone might need for a basic home server.
Down voted to negative… No counter points given… ok.
I personally agree. I think it’s being somewhat overhyped. If step one is physical access to get things rolling… like for sure some machines are in more public areas than others. But for me, someone would have to break into my house first, then access my machine, just to run exploits later. The exploit is pretty massive, but I think needs to be tempered with “first they need physical access”. Because physically controlling machines has always been number 1 for security.