lemmyreader@lemmy.ml to Linux@lemmy.mlEnglish · 8 months agoThe Other Players Who Helped (Almost) Make the World’s Biggest Backdoor Hacktheintercept.comexternal-linkmessage-square13fedilinkarrow-up1155arrow-down19file-text
arrow-up1146arrow-down1external-linkThe Other Players Who Helped (Almost) Make the World’s Biggest Backdoor Hacktheintercept.comlemmyreader@lemmy.ml to Linux@lemmy.mlEnglish · 8 months agomessage-square13fedilinkfile-text
minus-squareAxisential@lemmy.nzlinkfedilinkarrow-up15arrow-down1·8 months agoFascinating read - interesting that the origin of the hack is not yet known (or at least, released). I wonder what the stats are on these sorts of exploits in OSS - the concept relies so much on trust and individuals.
minus-squareatzanteol@sh.itjust.workslinkfedilinkEnglisharrow-up17·8 months ago the concept relies so much on trust and individuals. Everything does though.
minus-squarepmk@lemmy.sdf.orglinkfedilinkarrow-up4·8 months agoKen Thompson talked about this back in 1984, his talk/article “Reflections on trusting trust” is a short but scary read. https://www.cs.cmu.edu/~rdriley/487/papers/Thompson_1984_ReflectionsonTrustingTrust.pdf In the end, what can we trust?
minus-squareThe Doctor@beehaw.orglinkfedilinkEnglisharrow-up1·8 months agoUltimately, nothing, unless you built everything yourself from scratch, just about from the silicon up. Everything is risk management.
Fascinating read - interesting that the origin of the hack is not yet known (or at least, released). I wonder what the stats are on these sorts of exploits in OSS - the concept relies so much on trust and individuals.
Everything does though.
Ken Thompson talked about this back in 1984, his talk/article “Reflections on trusting trust” is a short but scary read.
https://www.cs.cmu.edu/~rdriley/487/papers/Thompson_1984_ReflectionsonTrustingTrust.pdf
In the end, what can we trust?
Ultimately, nothing, unless you built everything yourself from scratch, just about from the silicon up.
Everything is risk management.