Possibly linuxtoLinux@lemmy.mlEnglish·7 months agoXZ backdoor in a nutshell(lemmy.zip)imagearrow-up11.23Karrow-down110message-square162 fedilink
arrow-up11.22Karrow-down1imageXZ backdoor in a nutshell(lemmy.zip)Possibly linuxtoLinux@lemmy.mlEnglish·7 months agomessage-square162 fedilink
minus-squarewhereiskarrow-up13arrow-down0·7 months agolinkfedilinkIdeally you need a double-blind checking mechanism definitionally impervious to social engineering. That may be possible in larger projects but I doubt you can do much in where you have very few maintainers. I bet the lesson here for future attackers is: do not affect start-up time.
minus-squareunderiskarrow-up9arrow-down0·7 months agolinkfedilinkI imagine if this attacker wasn’t in a rush to get the backdoor into the upcoming Debian and Fedora stable releases he would have been able to notice and correct the increased CPU usage tell and remain undetected.
Ideally you need a double-blind checking mechanism definitionally impervious to social engineering.
That may be possible in larger projects but I doubt you can do much in where you have very few maintainers.
I bet the lesson here for future attackers is: do not affect start-up time.
I imagine if this attacker wasn’t in a rush to get the backdoor into the upcoming Debian and Fedora stable releases he would have been able to notice and correct the increased CPU usage tell and remain undetected.