← Back to context Comment by nobankai 1 year ago No, it really does not. 7 comments nobankai Reply Ylpertnodi 1 year ago How can you definitively know? nobankai 1 year ago In the case of Linux Mint, I can check the commit history, build the software myself and even validate it against public checksums. It is expressly defended against these types of attacks, making it an odd choice to single out. mihaaly 1 year ago Isn't it already a law violation using it in certain scenarios? Or will be soon? 3 replies →
Ylpertnodi 1 year ago How can you definitively know? nobankai 1 year ago In the case of Linux Mint, I can check the commit history, build the software myself and even validate it against public checksums. It is expressly defended against these types of attacks, making it an odd choice to single out. mihaaly 1 year ago Isn't it already a law violation using it in certain scenarios? Or will be soon? 3 replies →
nobankai 1 year ago In the case of Linux Mint, I can check the commit history, build the software myself and even validate it against public checksums. It is expressly defended against these types of attacks, making it an odd choice to single out. mihaaly 1 year ago Isn't it already a law violation using it in certain scenarios? Or will be soon? 3 replies →
mihaaly 1 year ago Isn't it already a law violation using it in certain scenarios? Or will be soon? 3 replies →
How can you definitively know?
In the case of Linux Mint, I can check the commit history, build the software myself and even validate it against public checksums. It is expressly defended against these types of attacks, making it an odd choice to single out.
Isn't it already a law violation using it in certain scenarios? Or will be soon?
3 replies →