lemmyreader to Linux@lemmy.mlEnglish • 8 months agoThe Other Players Who Helped (Almost) Make the World’s Biggest Backdoor Hacktheintercept.comexternal-linkmessage-square14fedilinkarrow-up1147arrow-down19file-text
arrow-up1138arrow-down1external-linkThe Other Players Who Helped (Almost) Make the World’s Biggest Backdoor Hacktheintercept.comlemmyreader to Linux@lemmy.mlEnglish • 8 months agomessage-square14fedilinkfile-text
minus-square@Axisential@lemmy.nzlinkfedilink14•8 months agoFascinating read - interesting that the origin of the hack is not yet known (or at least, released). I wonder what the stats are on these sorts of exploits in OSS - the concept relies so much on trust and individuals.
minus-square@atzanteol@sh.itjust.workslinkfedilinkEnglish17•8 months ago the concept relies so much on trust and individuals. Everything does though.
minus-square@pmk@lemmy.sdf.orglinkfedilink5•8 months agoKen Thompson talked about this back in 1984, his talk/article “Reflections on trusting trust” is a short but scary read. https://www.cs.cmu.edu/~rdriley/487/papers/Thompson_1984_ReflectionsonTrustingTrust.pdf In the end, what can we trust?
minus-squareThe DoctorlinkfedilinkEnglish3•8 months agoUltimately, nothing, unless you built everything yourself from scratch, just about from the silicon up. Everything is risk management.
Fascinating read - interesting that the origin of the hack is not yet known (or at least, released). I wonder what the stats are on these sorts of exploits in OSS - the concept relies so much on trust and individuals.
Everything does though.
Ken Thompson talked about this back in 1984, his talk/article “Reflections on trusting trust” is a short but scary read.
https://www.cs.cmu.edu/~rdriley/487/papers/Thompson_1984_ReflectionsonTrustingTrust.pdf
In the end, what can we trust?
Ultimately, nothing, unless you built everything yourself from scratch, just about from the silicon up.
Everything is risk management.