- cross-posted to:
- linux
- cross-posted to:
- linux
A video by SavvyNik that covers some of the highlights from the following recently published scientific article - Wolves in the Repository: A Software Engineering Analysis of the XZ Utils Supply Chain Attack
You must log in or # to comment.

