• dan@upvote.au
    link
    fedilink
    arrow-up
    28
    ·
    vor 2 Jahren

    and it was only discovered accidentally, when someone was profiling some stuff, noticed SSH using a bit too much CPU power when receiving connections even for invalid usernames/passwords, and spent the time to investigate it more deeply. A lot of developers aren’t that attentive, and it could have easily snuck through.

    • lemmesaydeleted by creator
      link
      fedilink
      arrow-up
      4
      ·
      vor 2 Jahren

      hey Dan, why don’t you post blogs now?

      • dan@upvote.au
        link
        fedilink
        arrow-up
        5
        ·
        vor 2 Jahren

        I’ve been meaning to start blogging again. It’s just been a lack of free time. Need to think of ideas, too.

        • lemmesaydeleted by creator
          link
          fedilink
          arrow-up
          2
          ·
          vor 2 Jahren

          understandable mate, have a nice day!

        • Possibly linux@lemmy.zip
          link
          fedilink
          English
          arrow-up
          1
          arrow-down
          1
          ·
          vor 2 Jahren

          I’ve never read your blogs but I think it would be good for more people to do write ups on the XZ backdoor. There is a lot that can be learned and improved