this post was submitted on 01 Aug 2025
231 points (97.9% liked)
Technology
73534 readers
2477 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related news or articles.
- Be excellent to each other!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
- Check for duplicates before posting, duplicates may be removed
- Accounts 7 days and younger will have their posts automatically removed.
Approved Bots
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
I mean... For real, I've never heard of Linux systems being hacked this way. I'm sure it's possible, but it certainly seems rarer.
Slipping shit in upstream also certainly doesn't happen "that* often. It takes effort to become recognised enough as a developer to be allowed access to the upstream code, meaning you can't automate those kinds of attacks. (I imagine. Correct me if I'm wrong.)
It does happen occasionally, from time to time, but, because everything is gasp open source, it tends to get caught, identified, blocked/quarantined and then fixed considerably more rapidly, with decent fallback instructions/procedures in that interim period.
Like apparently it actually just recently happened with some asshole uploading bs malware libs/sources to the AUR... even still, got caught pretty quickly.
Also, you can basically describe the entire CrowdStrike fiasco as exactly this kind of upstream oopsie doopsie.
Doesn't really matter in the big picture if it was intentionally malicious or not, when you Y2K 1/4 of the world's computer systems.
Absolute opposite. The majority of successful attacks you see today are identity management and supply chain attacks. If you walk into any OCIO office supply chain will be a top 3 concern.
I know of one successful supply chain attack in FOSS.
So still points for using it.
AUR has had multiple Trojans just this week
I'm sorry, Dave, but AUR does not count.
I... Don't understand what you said here 🫤