Originally posted by johnc
View Post
Announcement
Collapse
No announcement yet.
Intel Reverts Plans, Will Not Support Ubuntu's XMir
Collapse
X
-
Originally posted by johnc View PostWhat backdoors have been found in Windows 8?Last edited by TheBlackCat; 09 September 2013, 04:48 PM.
Comment
-
Originally posted by dee. View PostAnyway, at least the Linux kernel doesn't contain any NSA backdoors.
Comment
-
Originally posted by mrugiero View PostThere's no guarantee about it. There were contributors on one of the BSDs introducing back doors for the FBI with actual, useful commits, so it could happen the same to Linux. The idea Linux is completely safe because it's open source is wrong. It only means if you are cautious enough, you could verify it doesn't contain such back doors (IIRC, static analysis can detect most of them), but I don't know of anyone doing so. I hope they do run this kind of tools.
Comment
-
Originally posted by LinuxGamer View PostYou do understand that systemd is not a Red Hat project?
Comment
-
Originally posted by Teho View PostThen again systemd is more collaboratively developed and widely adopted than Upstart ever was so I find that argument bit hard to believe. I mean the original design was developed by Kay Sievers from Novell (at that time) and Lennart Poettering from Red Hat. To my understanding they started the project on their free time.
Originally posted by Teho View PostThe thing is that systemd and Upstart are fundamentally different whereas Wayland and Mir are essentially the same. To my knowledge the only fundamental difference is between client (Wayland) and server (Mir) allocated buffers and even that could be done on Wayland (and has been done apparently). Red Hat did collaborate with Upstart upstream though. Canonical never did the same for Wayland. They _never_ brought up the issues they had with Wayland to its upstream and clearly brought up their lack of understanding of Wayland when they released the Mir spec sheet (that had quite a bit of misinformation about Wayland).
With that said, I see something of a double standard here. The Wayland developers themselves stated that their work could have been a X11 extension. No one made a single complaint, but when Canonical does the same thing, people here form a lynch mob. In my view, both Wayland and Mir exist because their developers did not want to work on X11 improvements and that is perfectly fine. Their developers should not be criticized for going their own way.
Comment
-
Originally posted by mrugiero View PostThere's no guarantee about it. There were contributors on one of the BSDs introducing back doors for the FBI with actual, useful commits, so it could happen the same to Linux. The idea Linux is completely safe because it's open source is wrong. It only means if you are cautious enough, you could verify it doesn't contain such back doors (IIRC, static analysis can detect most of them), but I don't know of anyone doing so. I hope they do run this kind of tools.
On that note, how the hell did this thread deviate from Intel giving the finger to Canonical to Linux security analysis???
Comment
-
Originally posted by ryao View PostThat misses the point. People are free to collaborate as much or as little as they want. It is not our place to criticize them for going their own way.
With that said, I see something of a double standard here. The Wayland developers themselves stated that their work could have been a X11 extension. No one made a single complaint, but when Canonical does the same thing, people here form a lynch mob. In my view, both Wayland and Mir exist because their developers did not want to work on X11 improvements and that is perfectly fine. Their developers should not be criticized for going their own way.
Comment
-
Originally posted by MartinN View Posta backdoor also doesn't need to be explicit... with enough painstaking combing through the linux source code, one could conceivably find a usable exploit due to a bug (i.e. buffer overflow...or whatever) and use that as a way in, without ever reporting it. By the time everyone else catches up with the exploit (if ever), the damage would be done. Someone who is motivated and well funded could go this route....
On that note, how the hell did this thread deviate from Intel giving the finger to Canonical to Linux security analysis???
On the question about how it deviated, I frankly don't remember.
Comment
Comment