• 7 Posts
  • 269 Comments
Joined 3 years ago
cake
Cake day: June 14th, 2023

help-circle










  • Since you don’t understand, you lowered the level of the conversation and now I’m going to continue on that level because you get what you deserve.

    Ad hominem is a problem now when you started accusing me of lacking reading comprehension aka stupidity and then ignorance - in a field I am a professional in and have given reasoned and valid advice on.

    In multiple replies you failed to even attempt to address the elephant in the room; that you have zero fucking clue how to verify that applications delivered from a repo aren’t malicious.

    Given a real world example you simply ignore it “but search results” eat shit you moron. The legitimate website was popped so “rAnDoM wEbSiTeS” aren’t a factor or relevant.

    JuSt TrUsT iT bRo - nonsense uttered by an absolute fuckwit





  • It doesn’t matter if the software is delivered via a publishers website or via a package repository if the supply chain has been compromised.

    Clearly you’re not aware of any recent cyber security news or you’d know that the NPM package manager has suffered numerous attacks: https://www.bleepingcomputer.com/news/security/shai-hulud-malware-infects-500-npm-packages-leaks-secrets-on-github/

    I guess you should trust NPM though because its a package manager!

    You’re just encouraging people to blindly use and trust repos with no understanding of the pros or cons, and without understanding how you can verify and test software yourself to reduce risk. This is especially an easy conversaion when we talk closed source vs open source and you failed to even bring that up.

    Repeating nonsense claims instead of actually considering the entirely reasonable question only highlights that you’re victim to the Dunning-Kruger effect.

    You could have had a conversation and learned something from an actual cyber security professional and instead you’ve acted like a clown.