Remix.run Logo
LamaOfRuin 6 hours ago

That seems... not correct?

The comment was asking about preventing a compromised supplier for the developers.

A supply chain attack can be anywhere in the supply chain to the target. If I, the end user, am the target, then a supply chain attack compromising the developer of LittleSnitch is effective.

I may then be a conduit to compromising other software or components, and would both I and LittleSnitch would be part of the supply chain that could be attacked targeting them.

lapcat 6 hours ago | parent [-]

> If I, the end user, am the target

You're not a target, anonymous rando.

microtonal 2 hours ago | parent [-]

Many supply chain attacks aim to run malware on the end-users machine to harvest authentication tokens, etc. So pretty much everyone here who is a developer is the target.