I am reading a lot of takes about the backdoor in the last days.
There is nothing special about this attack-vector or approach in general*.
Our wholesome software-universe is a chaotic system of dependencies. No matter which language or compute-layer we're talking about.
The issue is no question about open-source vs proprietary or shared vs static libraries. It should make you think about awareness and your room and ability to maneuver.
Are you in direct or indirect control of the level of awareness of security relevant events regarding components you use?
And are you in direct or indirect control of the usage of components you use?
=> More informations about this toot | More toots from floriann@infosec.exchange
text/gemini
This content has been proxied by September (ba2dc).