← Back to context Comment by Ylpertnodi 10 months ago How can you definitively know? 6 comments Ylpertnodi Reply nobankai 10 months ago In the case of Linux Mint, I can check the commit history, build the software myself and even validate it against public checksums. It is expressly defended against these types of attacks, making it an odd choice to single out. mihaaly 10 months ago Isn't it already a law violation using it in certain scenarios? Or will be soon? Aachen 10 months ago No? Instead of speaking in question marks, why not link or reference the law or scenarios you're talking about? 2 replies →
nobankai 10 months ago In the case of Linux Mint, I can check the commit history, build the software myself and even validate it against public checksums. It is expressly defended against these types of attacks, making it an odd choice to single out. mihaaly 10 months ago Isn't it already a law violation using it in certain scenarios? Or will be soon? Aachen 10 months ago No? Instead of speaking in question marks, why not link or reference the law or scenarios you're talking about? 2 replies →
mihaaly 10 months ago Isn't it already a law violation using it in certain scenarios? Or will be soon? Aachen 10 months ago No? Instead of speaking in question marks, why not link or reference the law or scenarios you're talking about? 2 replies →
Aachen 10 months ago No? Instead of speaking in question marks, why not link or reference the law or scenarios you're talking about? 2 replies →
In the case of Linux Mint, I can check the commit history, build the software myself and even validate it against public checksums. It is expressly defended against these types of attacks, making it an odd choice to single out.
Isn't it already a law violation using it in certain scenarios? Or will be soon?
No? Instead of speaking in question marks, why not link or reference the law or scenarios you're talking about?
2 replies →