Ranter
Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Comments
-
hjk10156962yThis can happen with any software at any stage. Sometimes by accident/outsiders trough typosqatting, compromised tool-chain/server.
Generally the very late stage or very early stage injection are harder to detect once in undetected.
Other times it's by bad actors or government demand. -
macfanpl1022y@hjk101
> Other times it's by ( ... ) government demand.
Although it can happen, its extremely rare. 99% of CIV is done by bad actor. -
C0D4669022yOpen source does not guarantee secure source.
The larger the project / community the more observant eyes over changes. -
Someone did try to inject a back door into the Linux kernel at one time (that I know of). They caught it and recognized that it was in fact an attempt to put in a back door.
At the distribution, it would seem like that would be easier to attempt. No idea what kind of scrutiny there is at Ubuntu. If they have customers that pay real money, maybe less likely. Paying customers tend to get pissed when that happens. Even by accident.
Related Rants
-
gururaju56*Now that's what I call a Hacker* MOTHER OF ALL AUTOMATIONS This seems a long post. but you will definitely ...
-
linuxxx70This guy at my last internship. A windows fanboy to the fucking max! He was saying how he'd never use anythi...
-
creedasaurus62Another dev on my team just got a new machine. Before he came in today I made two separate USB installers and ...
Is there any chance that Linux open source distributions such as Ubuntu would hide malicious code or backdoor or similar thing in their code and simply hide it in their release publication?
question
linux