• @[email protected]
    link
    fedilink
    312 years ago

    The scary thing about this is thinking about potential undetected backdoors similar to this existing in the wild. Hopefully the lessons learned from the xz backdoor will help us to prevent similar backdoors in the future.

    • Possibly linuxOP
      link
      fedilink
      English
      192 years ago

      I think we need focus on zero trust when it comes to upstream software

        • Possibly linuxOP
          link
          fedilink
          English
          12 years ago

          It is fine to use them just know how they work and check the commit log.

          That of course requires you to pull from got instead of a tarball