jb55 on Nostr: Unless you’re reading the source of every dependency and you build all of your ...
Unless you’re reading the source of every dependency and you build all of your software from source, you’re always trusting someone, even in open source.
Many times the software you install on your computer was built by someone else, which has the chance to inject malware, separate from the code you read from their repo.
Published at
2024-06-12 12:59:25Event JSON
{
"id": "7cd1ff633a8d0a8347fd82aa69c6d58359850f44914ca79362593ff65b900d19",
"pubkey": "32e1827635450ebb3c5a7d12c1f8e7b2b514439ac10a67eef3d9fd9c5c68e245",
"created_at": 1718197165,
"kind": 1,
"tags": [
[
"e",
"7f4c5281ffc502b973307eb60010c970dbea020658e788d75e83cb4b7c660ce9",
"wss://relay.primal.net/",
"root"
],
[
"e",
"631fa5e8adceefad67647f1f93a3d75f5d694f73df8b4b322da770c413819009",
"",
"reply"
],
[
"p",
"963f712e0a30fbc77f9091e91da687658606f06729650993f1c38fba2577b2bd"
],
[
"p",
"eff0899a8d3e8ed7d7524b86f5a7077c1ec39ee305c191738b29b0bbfa20fe42"
]
],
"content": "Unless you’re reading the source of every dependency and you build all of your software from source, you’re always trusting someone, even in open source.\n\nMany times the software you install on your computer was built by someone else, which has the chance to inject malware, separate from the code you read from their repo.",
"sig": "34680b8112d9f6102fb839c8179770086fc5238f2ba4c64155eb43a964be6b3f0f55d4f96f482b60f3bab6da756cc2e2f1d35cff9720095019d693f7ef73f730"
}