thegreybeardofthetree, to openSUSE
@thegreybeardofthetree@fosstodon.org avatar

@linux Sharing a 'small' inconvenience I had to fix with (I suspect is the same) - I couldn't launch snaps (spotify, bitwarden) after update - error was: cannot determine seccomp compiler version in generateSystemKey fork/exec /usr/lib/snapd/snap-seccomp: no such file or directory

The fix (I first tried re-installing, didn't work) was to:
a. locate snap-seccomp - was in /usr/libexec/snapd
b. symlink: ln -s /usr/libexec/snapd /usr/lib/snapd

thegreybeardofthetree,
@thegreybeardofthetree@fosstodon.org avatar

@pastermil @linux the attack surface for something that isn't officially maintained by the developers, and that doesn't have more vetting (e.g. distribution packages) opens up room for malicious actors.

e.g. #arch / #aur recommends verifying scripts manually before installing, and malicious scripts have been found and removed.

There are actors like #jiatan out there. An unofficial #flatpak needs manual verification before install - that's why I just go with #snap if the flatpak isn't official

pastermil,

the attack surface for something that isn’t officially maintained by the developers, and that doesn’t have more vetting (e.g. distribution packages) opens up room for malicious actors.

There are actors like out there.

Funny that Jia Tan was an official maintainer of xz until he was found to be problematic.

Speaking of verifying, you know you can’t really verify anything on the snap server since they’re proprietary, right? On the contrary everything on flathub is laid to bare for anyone to look at.

In the end, you’re free to choose. Since you’ve kindly provided your argument, I’ve provided mine in hope you’d reconsider.

marcel, to random German
@marcel@waldvogel.family avatar

@ph0lk3r und @jrt haben die Entstehung der -Backdoor nochmals mit dem nötigen Abstand beleuchtet und ziehen einige Lehren daraus.

Insbesondere empfehlen sie die möglichst durchgängige Verwendung von signierten -Commits, ein Punkt der bei mir ⬆️⬆️⬆️ fehlte.

Ich setze die auch an einigen Stellen durchgängig ein, aber bisher nur an Stellen, wo keine Rebases oder Squashes nötig sind. Ich vermute, die verlieren die Signaturen, beim Rebase auch, wenn man es selbst macht?
https://research.hisolutions.com/2024/04/xz-backdoor-eine-aufarbeitung/

marcel,
@marcel@waldvogel.family avatar

Was wissen wir eigentlich über «Jia Tan»? Ich habe mich mal auf eine Spurensuche begeben. Und dabei herausgefunden, dass man mit der Sicherheitslücke wohl mehrere Milliarden hätte verdienen können.

Ich nehme euch gerne mit auf diese Reise und die Schlussfolgerungen, die sich daraus ergeben.

https://dnip.ch/2024/05/14/spurensuche-jia-tan-xz/

gertvdijk, to random
@gertvdijk@mastodon.social avatar

Lasse Collin in commit message: “The other maintainer suddenly disappeared.” 😆


https://github.com/tukaani-project/xz/commit/77a294d98a9d2d48f7e4ac273711518bf689f5c4

J_aa_p, (edited ) to random Dutch
@J_aa_p@mastodon.social avatar

From 'Friends' episode: .. uhm ... I forgot ...

'We* will hunt you down and kick your *ss'

Attn:

*Originally "I"

status_updates, to infosec
@status_updates@hachyderm.io avatar

Please extend a warm welcome to the newest member of our open source team: Jia Tan

echopapa, to linux German
@echopapa@social.tchncs.de avatar
  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • GTA5RPClips
  • DreamBathrooms
  • khanakhh
  • ngwrru68w68
  • Youngstown
  • magazineikmin
  • mdbf
  • slotface
  • thenastyranch
  • rosin
  • kavyap
  • tacticalgear
  • tester
  • provamag3
  • osvaldo12
  • cubers
  • ethstaker
  • everett
  • Durango
  • InstantRegret
  • Leos
  • normalnudes
  • modclub
  • anitta
  • cisconetworking
  • megavids
  • lostlight
  • All magazines