lemmyreader@lemmy.ml to Linux@lemmy.mlEnglish · 7 months agoThe Other Players Who Helped (Almost) Make the World’s Biggest Backdoor Hacktheintercept.comexternal-linkmessage-square14fedilinkarrow-up1147arrow-down19file-text
arrow-up1138arrow-down1external-linkThe Other Players Who Helped (Almost) Make the World’s Biggest Backdoor Hacktheintercept.comlemmyreader@lemmy.ml to Linux@lemmy.mlEnglish · 7 months agomessage-square14fedilinkfile-text
minus-squareAxisential@lemmy.nzlinkfedilinkarrow-up13arrow-down1·7 months agoFascinating read - interesting that the origin of the hack is not yet known (or at least, released). I wonder what the stats are on these sorts of exploits in OSS - the concept relies so much on trust and individuals.
minus-squareatzanteol@sh.itjust.workslinkfedilinkEnglisharrow-up15·7 months ago the concept relies so much on trust and individuals. Everything does though.
minus-squarepmk@lemmy.sdf.orglinkfedilinkarrow-up4·7 months agoKen Thompson talked about this back in 1984, his talk/article “Reflections on trusting trust” is a short but scary read. https://www.cs.cmu.edu/~rdriley/487/papers/Thompson_1984_ReflectionsonTrustingTrust.pdf In the end, what can we trust?
Fascinating read - interesting that the origin of the hack is not yet known (or at least, released). I wonder what the stats are on these sorts of exploits in OSS - the concept relies so much on trust and individuals.
Everything does though.
Ken Thompson talked about this back in 1984, his talk/article “Reflections on trusting trust” is a short but scary read.
https://www.cs.cmu.edu/~rdriley/487/papers/Thompson_1984_ReflectionsonTrustingTrust.pdf
In the end, what can we trust?