▲ | gf000 2 days ago | |||||||||||||||||||||||||
> when there was a dispute in the former project copperhead You mean who tried to hijack the project in a very questionable direction, harming their users, he rather lighted the project on fire then let the users' security be compromised? If anything, that is the greatest compliment you could give him. Also, this is fud that he can push any kind of code, like you can easily check any part of the pipeline. | ||||||||||||||||||||||||||
▲ | bernoufakis 2 days ago | parent [-] | |||||||||||||||||||||||||
> You mean who tried to hijack the project in a very questionable direction, harming their users, he rather lighted the project on fire then let the users' security be compromised? > If anything, that is the greatest compliment you could give him. On one hand, sure it can be a compliment. On the other hand, it only increases the perception that he is could enact significant harm if he ever comes after you. > Also, this is fud that he can push any kind of code, like you can easily check any part of the pipeline. Who is "you" ? Neither Rossmann, neither me (software dev albeit not in cybersecurity), and even less so the average GOS user, and I would venture to guess that neither you can audit GOS code with enough confidence to declare that the risk of an exploit or backdoor being introduced is zero. Open-source is not a guarantee that code or software is secure (for e.g. CVE in xz utils and many such cases). Edit: some clarifications. | ||||||||||||||||||||||||||
|