Conversation

It's a problem because the kernel is really complicated code written in a really unsafe language. Making the problem harder doesn't help anyone. "It's possible to submit malicious code to open source projects" isn't a revelation by any metric.
1
1
Replying to and
It being possible to submit code is a lot different than it being possible to land malicious code. The kernel being entirely written in a very unsafe language is part of the problem. That doesn't imply being able to so easily succeed in landing vulnerabilities in a project.
1
1
s/submit/land doesn't make it a revelation either. Of course open source is effectively build upon trust. And it's worth noting that the patches that most recently re-awakened this subject were actually "caught" pretty quickly.
1
Replying to and
Again, they didn't submit these patches from university email addresses and you're continuing to engage in slandering students not involved in it. That's unethical behavior too. Spreading misinformation as misdirection, especially attacking innocent people, is not okay.
2
Definitely not widely accepted that by using open source software, you inherently trust any random person able to submit code to a mailing list from Gmail. Pretty big difference between trusting the developers of a project and trusting anyone able to submit patches to it.
2
1
Replying to and
You're simply continuing to make disingenuous arguments. I never said anything of the kind. I'm well aware of the serious systemic security issues of the Linux kernel, which go way beyond an unsafe language and very lax code review. I really don't need you to explain it to me.
1
1
Replying to and
Clutching pearls? What? I'm simply explaining that to many people, the findings of the study are far from obvious. It was obvious to me, and clearly to you, but it isn't to many people. Scientific studies demonstrating something some people think is obvious aren't useless.
2
1
Show replies