[3 / 1 / 1]
Quoted By:
After all the xz racket, really how compromised its the kernel/open source model?
it isn't deactivated by simply using another version or xz utils/lib or disabling the ssh service?
How much of the linux ecosystem is compromised since anyone can make edits?
Have we seen the full extent of the backdoor (on linux/android/windows) or there will be more?*
What it the latest version of xz safe for sure?
Why does the vector limited to /x86_64/glibc and debs/rpm distros? Why not go full mode with
arm or other versions like slackware?
*it seems to have done commits to windowze
https://github.com/libarchive/libarchive/commits?author=JiaT75
it isn't deactivated by simply using another version or xz utils/lib or disabling the ssh service?
How much of the linux ecosystem is compromised since anyone can make edits?
Have we seen the full extent of the backdoor (on linux/android/windows) or there will be more?*
What it the latest version of xz safe for sure?
Why does the vector limited to /x86_64/glibc and debs/rpm distros? Why not go full mode with
arm or other versions like slackware?
*it seems to have done commits to windowze
https://github.com/libarchive/libarchive/commits?author=JiaT75