this post was submitted on 12 Apr 2024
214 points (98.6% liked)

Technology

59217 readers
2726 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 9 points 7 months ago* (last edited 7 months ago) (2 children)

Which was an exception to the rule and found immediately because of open source but go on with your bad self. Hell, they did so much investigative work they figured out it was a Russian hacker masquerading as a Chinese hacker.

[–] [email protected] 6 points 7 months ago

Wait, they have figured out the source now? Can you give me the link for more reading on how they did it?

[–] [email protected] -2 points 7 months ago (2 children)

Exception to the rule ?? I’d argue you have no idea how many times it succeeded because that’s the point. We only know what failed, if this worked I have no doubt that companies running Pegasus which have hundreds of millions of dollar of budget every year can success.

Open source when not maintained properly is fundamentally flawed, there just need one weak element in the chain, one package maintained by a handful of people on their own time.

[–] [email protected] 1 points 6 months ago (1 children)

Do you know how many times Microsoft has had a supply chain attack inject a critical vulnerability into Windows? Or how many times a malicious insider at Apple has added a backdoor to iOS?

Nope, and you cant possibly know because those systems are closed.

With open source software you have the ability to audit the code for vulnerabilities. We have the ability to reasonably state that that incident was an exception to the rule because its so easy to see the available code and major security incidents tend to become major news.

[–] [email protected] 0 points 6 months ago

An open not maintained system is worst than a well maintained but closed one. There are billions of $ behind window and macos. Some critical package on Linux are maintained by 2 guys during their spare time...

[–] [email protected] 1 points 6 months ago (1 children)
[–] [email protected] -3 points 6 months ago* (last edited 6 months ago) (1 children)

Holy fuck, every time: one line answer, no explanation, just Insults. Find someone to fck instead of crying on the internet.

[–] [email protected] 1 points 6 months ago

Triggered much, clownboy?