Comment by fsckboy
2 months ago
>Which brings us to the question: what is this guy going to do with (presumably) the kernel source?
it doesn't bring us to the question, but the answer to the question is, run a diff between the software that has this guys life in its hands, and the version it was derived from, to see if they inserted back doors, stray pointers, etc.
No comments yet
Contribute on Hacker News ↗