• @[email protected]
    link
    fedilink
    313 months ago

    The scary thing about this is thinking about potential undetected backdoors similar to this existing in the wild. Hopefully the lessons learned from the xz backdoor will help us to prevent similar backdoors in the future.

    • Possibly linuxOP
      link
      fedilink
      English
      183 months ago

      I think we need focus on zero trust when it comes to upstream software

        • Possibly linuxOP
          link
          fedilink
          English
          13 months ago

          It is fine to use them just know how they work and check the commit log.

          That of course requires you to pull from got instead of a tarball