← Back to context Comment by Ylpertnodi 1 year ago How can you definitively know? 6 comments Ylpertnodi Reply nobankai 1 year ago In the case of Linux Mint, I can check the commit history, build the software myself and even validate it against public checksums. It is expressly defended against these types of attacks, making it an odd choice to single out. mihaaly 1 year ago Isn't it already a law violation using it in certain scenarios? Or will be soon? Aachen 1 year ago No? Instead of speaking in question marks, why not link or reference the law or scenarios you're talking about? 2 replies →
nobankai 1 year ago In the case of Linux Mint, I can check the commit history, build the software myself and even validate it against public checksums. It is expressly defended against these types of attacks, making it an odd choice to single out. mihaaly 1 year ago Isn't it already a law violation using it in certain scenarios? Or will be soon? Aachen 1 year ago No? Instead of speaking in question marks, why not link or reference the law or scenarios you're talking about? 2 replies →
mihaaly 1 year ago Isn't it already a law violation using it in certain scenarios? Or will be soon? Aachen 1 year ago No? Instead of speaking in question marks, why not link or reference the law or scenarios you're talking about? 2 replies →
Aachen 1 year ago No? Instead of speaking in question marks, why not link or reference the law or scenarios you're talking about? 2 replies →
In the case of Linux Mint, I can check the commit history, build the software myself and even validate it against public checksums. It is expressly defended against these types of attacks, making it an odd choice to single out.
Isn't it already a law violation using it in certain scenarios? Or will be soon?
No? Instead of speaking in question marks, why not link or reference the law or scenarios you're talking about?
2 replies →