Comment by Ylpertnodi 1 day ago How can you definitively know? 6 comments Ylpertnodi Reply nobankai 1 day ago In the case of Linux Mint, I can check the commit history, build the software myself and even validate it against public checksums. It is expressly defended against these types of attacks, making it an odd choice to single out. mihaaly 1 day ago Isn't it already a law violation using it in certain scenarios? Or will be soon? Aachen 11 hours ago No? Instead of speaking in question marks, why not link or reference the law or scenarios you're talking about? 2 replies →
nobankai 1 day ago In the case of Linux Mint, I can check the commit history, build the software myself and even validate it against public checksums. It is expressly defended against these types of attacks, making it an odd choice to single out. mihaaly 1 day ago Isn't it already a law violation using it in certain scenarios? Or will be soon? Aachen 11 hours ago No? Instead of speaking in question marks, why not link or reference the law or scenarios you're talking about? 2 replies →
mihaaly 1 day ago Isn't it already a law violation using it in certain scenarios? Or will be soon? Aachen 11 hours ago No? Instead of speaking in question marks, why not link or reference the law or scenarios you're talking about? 2 replies →
Aachen 11 hours ago No? Instead of speaking in question marks, why not link or reference the law or scenarios you're talking about? 2 replies →
In the case of Linux Mint, I can check the commit history, build the software myself and even validate it against public checksums. It is expressly defended against these types of attacks, making it an odd choice to single out.
Isn't it already a law violation using it in certain scenarios? Or will be soon?
No? Instead of speaking in question marks, why not link or reference the law or scenarios you're talking about?
2 replies →