← Back to context Comment by Ylpertnodi 21 hours ago How can you definitively know? 6 comments Ylpertnodi Reply nobankai 21 hours ago In the case of Linux Mint, I can check the commit history, build the software myself and even validate it against public checksums. It is expressly defended against these types of attacks, making it an odd choice to single out. mihaaly 20 hours ago Isn't it already a law violation using it in certain scenarios? Or will be soon? Aachen 5 hours ago No? Instead of speaking in question marks, why not link or reference the law or scenarios you're talking about? 2 replies →
nobankai 21 hours ago In the case of Linux Mint, I can check the commit history, build the software myself and even validate it against public checksums. It is expressly defended against these types of attacks, making it an odd choice to single out. mihaaly 20 hours ago Isn't it already a law violation using it in certain scenarios? Or will be soon? Aachen 5 hours ago No? Instead of speaking in question marks, why not link or reference the law or scenarios you're talking about? 2 replies →
mihaaly 20 hours ago Isn't it already a law violation using it in certain scenarios? Or will be soon? Aachen 5 hours ago No? Instead of speaking in question marks, why not link or reference the law or scenarios you're talking about? 2 replies →
Aachen 5 hours ago No? Instead of speaking in question marks, why not link or reference the law or scenarios you're talking about? 2 replies →
In the case of Linux Mint, I can check the commit history, build the software myself and even validate it against public checksums. It is expressly defended against these types of attacks, making it an odd choice to single out.
Isn't it already a law violation using it in certain scenarios? Or will be soon?
No? Instead of speaking in question marks, why not link or reference the law or scenarios you're talking about?
2 replies →