[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Why are in-person meetings required for the debian keyring?



Nikolaus Rath <Nikolaus@rath.org> writes:
> I think that's a pretty weak argument. Even if you assume that a
> theoretical perpetrator originally joined Debian with good intentions
> (i.e., without using a faked id in the first place), and that you are
> actually able to sue in the relevant country, you'd still have a very
> hard time proving any malicious intention (the developer may just not
> have noticed the compromising code).

This seems like a good opportunity to point to
http://underhanded.xcott.com/ for some really great examples of how to
introduce a backdoor with plausible deniability.

Best,
-Nikolaus

-- 
GPG encrypted emails preferred. Key id: 0xD113FCAC3C4E599F
Fingerprint: ED31 791B 2C5C 1613 AF38 8B8A D113 FCAC 3C4E 599F

             »Time flies like an arrow, fruit flies like a Banana.«


Reply to: