Scott Kitterman <deb...@kitterman.com> writes:

> Do you have any examples of problems that this would have avoided
> (xz-utils isn't one - due to the way it's releases are done, it
> wouldn't be suitable for tag2upload)?

I'm somehow reminded of Ignaz Semmelweis's attempts to improve medical
hygiene by getting doctors to emulate the local midwives, who scrubbed
their hands between patients, whereas the doctors generally didn't, and
would alternate between performing autopsies and attending deliveries.

I'd guess someone may well have pushed back against that, thus:

  Can you to name a single patient who has suffered as a result of
  existing practice?

If I stretch that metaphor (possibly beyond breaking point), then one
might think of our developers' laptops as the (potentially infected)
cadavers, the newly uploaded source packages as the live births, and our
tooling as the doctors' hands that may carry the infectious material
from one to the other.

I hope that we've been lucky enough to not actually have any of the
relevant "infections" in the population of laptops that produce our
packages, but would it not be wise to make it more difficult for such an
infection to be silently transmitted?

People state that a compromised machine can as easily commit malicious
code to git as it could insert it into a source package, but the
difference is that the malicious commit then needs to be pushed in
order to work, exposing it to examination.

In our metaphor perhaps the git commit step would equate to requiring
doctors to touch a new Petri dish before each patient, which would at
least record what was going on, and might give the opportunity to deal
with the situation before real harm is done.

Cheers, Phil.
-- 
Philip Hands -- https://hands.com/~phil

Attachment: signature.asc
Description: PGP signature

Reply via email to