Comment by nobankai 10 months ago No, it really does not. 7 comments nobankai Reply Ylpertnodi 10 months ago How can you definitively know? nobankai 10 months ago In the case of Linux Mint, I can check the commit history, build the software myself and even validate it against public checksums. It is expressly defended against these types of attacks, making it an odd choice to single out. mihaaly 10 months ago Isn't it already a law violation using it in certain scenarios? Or will be soon? 3 replies →
Ylpertnodi 10 months ago How can you definitively know? nobankai 10 months ago In the case of Linux Mint, I can check the commit history, build the software myself and even validate it against public checksums. It is expressly defended against these types of attacks, making it an odd choice to single out. mihaaly 10 months ago Isn't it already a law violation using it in certain scenarios? Or will be soon? 3 replies →
nobankai 10 months ago In the case of Linux Mint, I can check the commit history, build the software myself and even validate it against public checksums. It is expressly defended against these types of attacks, making it an odd choice to single out. mihaaly 10 months ago Isn't it already a law violation using it in certain scenarios? Or will be soon? 3 replies →
mihaaly 10 months ago Isn't it already a law violation using it in certain scenarios? Or will be soon? 3 replies →
How can you definitively know?
In the case of Linux Mint, I can check the commit history, build the software myself and even validate it against public checksums. It is expressly defended against these types of attacks, making it an odd choice to single out.
Isn't it already a law violation using it in certain scenarios? Or will be soon?
3 replies →