Possibly linux to Linux@lemmy.mlEnglish • 8 months agoXZ backdoor in a nutshelllemmy.zipimagemessage-square162fedilinkarrow-up11.22K
arrow-up11.22KimageXZ backdoor in a nutshelllemmy.zipPossibly linux to Linux@lemmy.mlEnglish • 8 months agomessage-square162fedilink
minus-square@whereisk@lemmy.worldlinkfedilink13•8 months agoIdeally you need a double-blind checking mechanism definitionally impervious to social engineering. That may be possible in larger projects but I doubt you can do much in where you have very few maintainers. I bet the lesson here for future attackers is: do not affect start-up time.
minus-square@underisk@lemmy.mllinkfedilink9•8 months agoI imagine if this attacker wasn’t in a rush to get the backdoor into the upcoming Debian and Fedora stable releases he would have been able to notice and correct the increased CPU usage tell and remain undetected.
Ideally you need a double-blind checking mechanism definitionally impervious to social engineering.
That may be possible in larger projects but I doubt you can do much in where you have very few maintainers.
I bet the lesson here for future attackers is: do not affect start-up time.
I imagine if this attacker wasn’t in a rush to get the backdoor into the upcoming Debian and Fedora stable releases he would have been able to notice and correct the increased CPU usage tell and remain undetected.