Oh

On Mon, 18 Apr 2022, 00:00 Daniel Pocock, <dan...@pocock.pro> wrote:

>
> On 17/04/2022 19:26, Satvik Sinha wrote:
> > Hi,guys and Good Day! So in recent days ,it was observed that many open
> > source contributors vandalised their or someone else's  project's
> > reputation to show agendas of Russia-Ukraine war, Some even vandalised
> > their project to destroy system in Russia and Belarus (Node-ipc being
> > one of them) that affected many people and their trust on open-source
> > software. So I wanted to ask How safe is Debian doing right now and how
> > will you guys prevent contributors pushing such malicious code into your
> > software and how will you detect a software getting vandalised to showed
> > Anti-war agenda by abusing your OS's reputation?
>
> If there are backdoors in Debian then they are harder to detect.  Large
> intelligence agencies aim for plausible deniability.  Look at the
> infamous OpenSSL vulnerability[1].  After investing so much time
> planting agents and backdoors in Debian, they will not want to blow
> their cover by doing something so brash.
>
> There has recently been evidence on Debian Community News about some
> cases, for example:
>
> Paul Tagliamonte and Sam Hartman and their Pentagon connections, with
> photos
>
> Jonathan Wiltshire and Chris Lamb having GCHQ proximity, with a map
>
> There are approximately 1000 Debian Developers and when one of us makes
> an upload, there is no obligation for somebody else to check it.  On the
> other hand, there is a period of days or weeks before new uploads can
> propagate to stable systems.  This may make it more robust if you only
> use stable.
>
> debian-proj...@lists.debian.org is now being censored to stop
> discussions like this about Debian integrity.
>
> Regards,
>
> Daniel
>
> 1.
>
> https://igurublog.wordpress.com/2014/04/08/julian-assange-debian-is-owned-by-the-nsa/
>
> --
> Debian Developer
> https://danielpocock.com
>

Reply via email to