Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

True, the only real counterpoint is someone who clones the repo, inspects it, and builds from source.


Do you really own your own operating system if you haven't compiled the kernel yourself?


Even if you do compile the kernel yourself, do you really own your OS if you haven't compiled the compiler yourself? Did you use a pre-built compiler binary to compile the compiler?

Now we're getting to the real questions in life. :)

(Incidentally, this is probably the most fundamental software supply chain attack vector - manipulate the compiler binary used to compile the compiler used to compile the kernel and userspace. The attack payload would never appear in any sources, but would always be present in binaries.)





Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: