← Back to context Comment by nobankai 1 day ago [flagged] 7 comments nobankai Reply Ylpertnodi 1 day ago How can you definitively know? nobankai 1 day ago In the case of Linux Mint, I can check the commit history, build the software myself and even validate it against public checksums. It is expressly defended against these types of attacks, making it an odd choice to single out. mihaaly 20 hours ago Isn't it already a law violation using it in certain scenarios? Or will be soon? 3 replies →
Ylpertnodi 1 day ago How can you definitively know? nobankai 1 day ago In the case of Linux Mint, I can check the commit history, build the software myself and even validate it against public checksums. It is expressly defended against these types of attacks, making it an odd choice to single out. mihaaly 20 hours ago Isn't it already a law violation using it in certain scenarios? Or will be soon? 3 replies →
nobankai 1 day ago In the case of Linux Mint, I can check the commit history, build the software myself and even validate it against public checksums. It is expressly defended against these types of attacks, making it an odd choice to single out. mihaaly 20 hours ago Isn't it already a law violation using it in certain scenarios? Or will be soon? 3 replies →
mihaaly 20 hours ago Isn't it already a law violation using it in certain scenarios? Or will be soon? 3 replies →
How can you definitively know?
In the case of Linux Mint, I can check the commit history, build the software myself and even validate it against public checksums. It is expressly defended against these types of attacks, making it an odd choice to single out.
Isn't it already a law violation using it in certain scenarios? Or will be soon?
3 replies →