On 08/03/13 13:36, Rick Moen wrote:
> Quoting Volker Birk (v...@pibit.ch):
>
>> Really?
>>
>> How do you detect, if maintainer's patches contain backdoors? If I would
>> want to attack Debian, I would try to become the maintainer of one of
>> the most harmless, most used packages. And believe me,
On Tue, 2011-09-13 at 22:47 +0200, Kees de Jong wrote:
> I've been running my Debian machines with Grsec2 (package:
> "linux-patch-grsecurity2") for a long time.
> I thought that would keep me rather save, but I've ran Paxtest today
> (which is in the Debian repository only available for i386...)
>
On Sun, 2011-01-23 at 19:32 -0500, Michael Gilbert wrote:
>
> Also, a discussion could be started with SPI to see if they are
> willing to purchase a CA cert. That would at least allow users with
> implicit trust in the CA system to get a nice fuzzy feeling when they
> see the lock icon when down
On Sun, 2011-01-23 at 19:34 +0200, AK wrote:
> a small disclaimer first, I am not affiliated with debian in any way,
> I am, as the original author would have put it a user.
The same goes for me, so I suppose my remarks should be taken with a
comparably-sized grain of salt. :) That said:
> 1)
On Mon, 2011-01-03 at 08:19 -0800, Ben Pfaff wrote:
> Eduardo M KALINOWSKI writes:
>
> > How much do you trust your USB drive? It could have a malicious
> > controller that detects when the correct Fedora files are written to
> > it, and replaces with hacked copies. And when you try to verify the
5 matches
Mail list logo