Comment by nobankai 4 months ago No, it really does not. 7 comments nobankai Reply Ylpertnodi 4 months ago How can you definitively know? nobankai 4 months ago In the case of Linux Mint, I can check the commit history, build the software myself and even validate it against public checksums. It is expressly defended against these types of attacks, making it an odd choice to single out. mihaaly 4 months ago Isn't it already a law violation using it in certain scenarios? Or will be soon? 3 replies →
Ylpertnodi 4 months ago How can you definitively know? nobankai 4 months ago In the case of Linux Mint, I can check the commit history, build the software myself and even validate it against public checksums. It is expressly defended against these types of attacks, making it an odd choice to single out. mihaaly 4 months ago Isn't it already a law violation using it in certain scenarios? Or will be soon? 3 replies →
nobankai 4 months ago In the case of Linux Mint, I can check the commit history, build the software myself and even validate it against public checksums. It is expressly defended against these types of attacks, making it an odd choice to single out. mihaaly 4 months ago Isn't it already a law violation using it in certain scenarios? Or will be soon? 3 replies →
mihaaly 4 months ago Isn't it already a law violation using it in certain scenarios? Or will be soon? 3 replies →
How can you definitively know?
In the case of Linux Mint, I can check the commit history, build the software myself and even validate it against public checksums. It is expressly defended against these types of attacks, making it an odd choice to single out.
Isn't it already a law violation using it in certain scenarios? Or will be soon?
3 replies →