| ▲ | LamaOfRuin 6 hours ago | |||||||
That seems... not correct? The comment was asking about preventing a compromised supplier for the developers. A supply chain attack can be anywhere in the supply chain to the target. If I, the end user, am the target, then a supply chain attack compromising the developer of LittleSnitch is effective. I may then be a conduit to compromising other software or components, and would both I and LittleSnitch would be part of the supply chain that could be attacked targeting them. | ||||||||
| ▲ | lapcat 6 hours ago | parent [-] | |||||||
> If I, the end user, am the target You're not a target, anonymous rando. | ||||||||
| ||||||||