A backdoor in xz
A backdoor in xz
Posted Mar 29, 2024 18:08 UTC (Fri) by AdamW (subscriber, #48457)In reply to: A backdoor in xz by bluca
Parent article: A backdoor in xz
Posted Mar 29, 2024 18:16 UTC (Fri)
by alex (subscriber, #1355)
[Link] (5 responses)
Posted Mar 30, 2024 4:26 UTC (Sat)
by marcH (subscriber, #57642)
[Link] (3 responses)
Posted Mar 30, 2024 6:07 UTC (Sat)
by ssmith32 (subscriber, #72404)
[Link] (2 responses)
So, yeah excluding people from the community that are more interested in their own academic careers rather than genuinely helping - that's not "shooting the messenger".
[1]https://m.youtube.com/watch?v=fu8ZNRDQsi8&t=6771s
Posted Mar 30, 2024 14:37 UTC (Sat)
by marcH (subscriber, #57642)
[Link] (1 responses)
Posted Mar 30, 2024 14:41 UTC (Sat)
by marcH (subscriber, #57642)
[Link]
Posted Mar 30, 2024 11:27 UTC (Sat)
by jd (guest, #26381)
[Link]
There are also packages that have been modified to not work in certain countries, and one Python package got effectively yeeted by the primary maintainer over politics.
And it's reasonable to assume that we only know a small percentage of cases.
Closed source is unlikely to be better. It would seem to me that quite a number of exploits that get discovered seem to be very bizarre backdoors.
If we generalise to all malicious code, then the Sony Rootkit is probably the most notorious.
A backdoor in xz
A backdoor in xz
A backdoor in xz
[2]https://www.mail-archive.com/xz-devel@tukaani.org/msg0057...
A backdoor in xz
A backdoor in xz
A backdoor in xz