
4·
1 month ago“stolen” is such an exaggerated misrepresentation…news organizations should really do better. When you steal something from someone, the owner loses access to it. She just liberated public research.
“stolen” is such an exaggerated misrepresentation…news organizations should really do better. When you steal something from someone, the owner loses access to it. She just liberated public research.
What is this!? Mama didn’t raise no bottom!
Nah not really…most of the time I’m at least doing a light metadata check, like who’s the maintainer & main contributors, any trusted folks have starred the repo, how active is development and release frequency, search issues with “vulnerability”/“cve” see how contributors communicate on those, previous cve track record.
With real code audits… I could only ever be using a handful of programs, let alone the thought of me fully auditing the whole linux kernel before I trust it 😄
Focusing on “mission critical” apps feels pretty useless imho, because it doesn’t really matter which of the thousands of programs on your system executes malicious code, no? Like sure, the app you use for handling super sensitive data might be secure and audited…then you get fucked by some obscure compression library silently loaded by a bunch of your programs.