this post was submitted on 02 Sep 2023
36 points (77.3% liked)

Privacy

32159 readers
843 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
top 4 comments
sorted by: hot top controversial new old
[–] [email protected] 10 points 1 year ago

the programmer is an engineer with a low qualification level who can't detect scams.

The author of the article doesn’t appear to understand that confidence games don’t depend on how skilled someone is in their field; they are usually a statistical attack depending on a small percentage of any population being credulous about any offer at any given time.

The only way to defend against these scams is defense in depth, via publishing requirements, policies, policy review, code review and security testing.

I should also point out that OSS has come under heavy attack recently with attackers leveraging the dependency chain to trick OSS developers into installing malicious libraries that look a lot like the legitimate versions. Often they create developer identities on GitHub, create a single legitimate project, and do some legitimate commits to a range of other projects. Then they stand up another account and use it to create trojanized libraries, and then switch their now popular project to use the malicious libraries. In some cases, their popular project is a library itself, so every project with dependencies on that library automatically inherits its malicious dependency.

These days, assume that code is likely compromised no matter where it’s from, and do your reviews and testing and set your policies accordingly.

[–] [email protected] 3 points 1 year ago (1 children)

There is a simple solution to this. Just don't use proprietary software

[–] [email protected] 2 points 1 year ago

Yes in theory, but you have to vet the libraries you add to be really sure, even these "integrations" might be open source and still be malicious, because they prey on the lazy devs (..don't look at me 👀) that would just look at the license and say "ah it's MIT, all good then".
To be honest, they would also need to be either very gullible or desperate to fall for such an offer, open source devs usually don't go around offering get rich quick schemes

[–] [email protected] 1 points 1 year ago

Why post in two communities without crossposting? The comments in the other thread were helpful. This is just shillposting, the way you're doing it.