Comments by "" (@PainterVierax) on "Mastery Learning" channel.

  1. 30
  2. 13
  3. 10
  4. 5
  5. 5
  6. 4
  7. 3
  8. 2
  9.  @dansanger5340  you're right for supply chain attacks, though it's only a small fraction of the whole spectrum of attacks, even when narrowing the issue on social engineering only which is already a large palette of attack strategies. In this peculiar case of xzlib, we can claim this is the worst case FLOSS got. But, ultimately, the real impact, particularly on production systems, was extremely limited and as always mitigations were deployed very quickly inside every distro. So the whole supply chain reacted flawlessly, and it took a very long preptime for the attacker to fail in the end. Sure the discovery of that vulnerability was very random and very late in the deployment chain, though it showed how any techie can easily bring their own contribution and how virtuous the transparency of the FLOSS model is to make the code safe. All in all it made devs and maintainers more aware of security issues, raising bad habits like using prepacked archives, making a key component like having key components depending on a single 3rd party library, like patching soft in an unsafe manner for convenience, etc. and in a way it kinda gave a point to the cathedral paradigm over the bazaar (but also annihilates it for a more heterogeneous ecosystem) as well as the necessity of those few rugged stable/enterprise distros too easily criticized by rolling release advocates. This was a very frightening reality check for the people too much comfortable with the apparent sense of security and I truly believe any people in the chain has learnt something of this event.
    1
  10.  @dansanger5340  you're right for supply chain attacks, though it's only a small fraction of the whole spectrum of attacks, even when narrowing the issue on social engineering only which is already a large palette of attack strategies. In this peculiar case of xzlib, we can claim this is the worst case FLOSS got. But, ultimately, the real impact, particularly on production systems, was extremely limited and as always mitigations were deployed very quickly inside every distro. So the whole supply chain reacted flawlessly, and it took a very long preptime for the attacker to fail in the end. Sure the discovery of that vulnerability was very random and very late in the deployment chain, though it showed how any techie can easily bring their own contribution and how virtuous the transparency of the FLOSS model is to make the code safe. All in all it made devs and maintainers more aware of security issues, raising bad habits like using prepacked archives, making a key component like having key components depending on a single 3rd party library, like patching soft in an unsafe manner for convenience, etc. and in a way it kinda gave a point to the cathedral paradigm over the bazaar (but also annihilates it for a more heterogeneous ecosystem) as well as the necessity of those few rugged stable/enterprise distros too easily criticized by rolling release advocates. This was a very frightening reality check for the people too much comfortable with the apparent sense of security and I truly believe any people in the chain has learnt something of this event.
    1
  11.  @dansanger5340  you're right for supply chain atks, though it's only a small fraction of the whole spectrum of vulnerabilities, even when narrowing the issue on social engineering only which is already a large palette of various strategies. In this peculiar case of xzlib, we can claim this is the worst case FLOSS got. But, ultimately, the real impact, particularly on production systems, was extremely limited and as always mitigations were deployed very quickly inside every distro. So the whole supply chain reacted flawlessly, and it took a very long preptime for the attacker to fail in the end. Sure the discovery of that vulnerability was very random and very late in the deployment chain, though it showed how any techie can easily bring their own contribution and how virtuous the transparency of the FLOSS model is to make the code safe. All in all it made devs and maintainers more aware of security issues, raising bad habits like using prepacked archives, making a key component like having key components depending on a single 3rd party library, like patching soft in an unsafe manner for convenience, etc. and in a way it kinda gave a point to the cathedral paradigm over the bazaar (but also annihilates it for a more heterogeneous ecosystem) as well as the necessity of those few rugged stable/enterprise distros too easily criticized by rolling release advocates. This was a very frightening reality check for the people too much comfortable with the apparent sense of security and I truly believe any people in the chain has learnt something of this event.
    1
  12. 1
  13. 1
  14. 1
  15. 1
  16. 1
  17. 1
  18. 1
  19. 1