Comment by Earw0rm
3 days ago
Right, but at least with supply-chain attacks the dependency tree is fixed and deterministic.
Nondeterministic systems are hard to debug, this opens up a threat-class which works analogously to supply-chain attacks but much harder to detect and trace.
No comments yet
Contribute on Hacker News ↗