monyet.cc
  • Communities
  • Create Post
  • Create Community
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
@HayadSont@discuss.online to Linux@programming.devEnglish •
edit-2
1 month ago

XZ Utils Back Door in Linux - Analysis of the Attack

www.youtube.com

message-square
3
fedilink
  • cross-posted to:
  • linux@lemmy.world
44
external-link

XZ Utils Back Door in Linux - Analysis of the Attack

www.youtube.com

@HayadSont@discuss.online to Linux@programming.devEnglish •
edit-2
1 month ago
message-square
3
fedilink
  • cross-posted to:
  • linux@lemmy.world
- YouTube
www.youtube.com
external-link
Enjoy the videos and music that you love, upload original content and share it all with friends, family and the world on YouTube.

A video by SavvyNik that covers some of the highlights from the following recently published scientific article - Wolves in the Repository: A Software Engineering Analysis of the XZ Utils Supply Chain Attack

alert-triangle
You must log in or register to comment.
  • @HayadSont@discuss.onlineOP
    link
    fedilink
    1•
    edit-2
    7 hours ago

    deleted by creator

  • @jia_tan@lemmy.blahaj.zone
    link
    fedilink
    English
    11•1 month ago

    Pretty good breakdown. Glad to see my hard work recognized!

  • @w3dd1e@lemm.ee
    link
    fedilink
    5•1 month ago

    Thanks for posting. I was literally l looking for updates on this recently and couldn’t find anything. I was worried that it might have been forgotten about

    • @HayadSont@discuss.onlineOP
      link
      fedilink
      3•1 month ago

      Thanks for posting.

      It has been my pleasure!

      I was worried that it might have been forgotten about

      The XZ utils supply chain attack has actually made the community more wary of blobs. Some projects were even prompted to come clean on this matter.

      Fedora has also recently made a push towards reproducible builds. In the lwn.net article that discussed that push, one of Fedora’s spokespeople explicitly said that it would help combat supply chain attacks.

      So, all in all, I can confidently say that it did leave a mark on the Linux landscape. Hopefully, this specific attack vector will not be as viable in the foreseeable future.

Linux@programming.dev

!linux@programming.dev

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !linux@programming.dev

A community for everything relating to the GNU/Linux operating system

Also check out:

  • !linux_memes@programming.dev
  • !linuxphones@lemmy.ca

Original icon base courtesy of lewing@isc.tamu.edu and The GIMP

  • 637 users / day
  • 1.97K users / week
  • 3.64K users / month
  • 8.92K users / 6 months
  • 7.95K subscribers
  • 1.81K Posts
  • 13.8K Comments
  • Modlog
  • mods:
  • Ategon
  • adr1an
  • dwraf_of_ignorance
  • BE: 0.19.3
  • Modlog
  • Legal
  • Instances
  • Docs
  • Code
  • join-lemmy.org