▲ | bernoufakis 2 days ago | ||||||||||||||||
> You mean who tried to hijack the project in a very questionable direction, harming their users, he rather lighted the project on fire then let the users' security be compromised? > If anything, that is the greatest compliment you could give him. On one hand, sure it can be a compliment. On the other hand, it only increases the perception that he is could enact significant harm if he ever comes after you. > Also, this is fud that he can push any kind of code, like you can easily check any part of the pipeline. Who is "you" ? Neither Rossmann, neither me (software dev albeit not in cybersecurity), and even less so the average GOS user, and I would venture to guess that neither you can audit GOS code with enough confidence to declare that the risk of an exploit or backdoor being introduced is zero. Open-source is not a guarantee that code or software is secure (for e.g. CVE in xz utils and many such cases). Edit: some clarifications. | |||||||||||||||||
▲ | other8026 2 days ago | parent [-] | ||||||||||||||||
> On the other hand, it only increases the perception that he is could enact significant harm if he ever comes after you. But that would be incorrect. It's not possible for anyone from the GrapheneOS project to target a GrapheneOS user that way. Look into how updates and the update servers work. > neither you can audit GOS code with enough confidence to declare that the risk of an exploit or backdoor being introduced is zero. The updater app is pretty easy to read through. I think a software developer would be able to understand it. The update servers' setups are also very easy to understand. It doesn't take a software developer genius to figure these things out. | |||||||||||||||||
|