this post was submitted on 02 Apr 2024
14 points (100.0% liked)
Programmer Humor
32415 readers
370 users here now
Post funny things about programming here! (Or just rant about your favourite programming language.)
Rules:
- Posts must be relevant to programming, programmers, or computer science.
- No NSFW content.
- Jokes must be in good taste. No hate speech, bigotry, etc.
founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
There are two types of backdoors, the ones that were fixed and the ones we don't know about.
don't forget the ones we got paid for very well and the ones we introduced to not go to prison
And the ones you leave for yourself to check during development and forgotten to close before release.
This is why you should secure your own bureaucracy-bypassing backdoor with a long ass key (bonus point if you use pki instead of a simple static key).
The only reason why xz got exposed was because someone noticed SSH was a bit slower and decided to take it to their own hands to investigate. It’s possible this backdoor would go unnoticed for far longer if the attacker didn’t make this slight oversight.
So it might be that there have been other, successful attacks before. It’s just that this one is the one that got exposed.
Slower as in 500ms slower iirc.
Linux users when bloat
tbh given the context 500ms is a lot.
Yeah. 500ms for ssh feels like an eternity.
SSHing into my less powerful machines takes a good few seconds, so I'm not sure if I'd notice an extra 500ms. For the more powerful ones that are basically instant it would be much more noticeable.