this post was submitted on 14 Jan 2026
28 points (88.9% liked)

Technology

78750 readers
3922 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

cross-posted from : https://lemmy.zip/post/56962298

you are viewing a single comment's thread
view the rest of the comments
[–] PierceTheBubble@lemmy.ml 1 points 12 hours ago* (last edited 12 hours ago)

Yes, because they constitute a significant portion, of the eyes, traditionally involved with doing the verification of software. You can allow a potentially cherry-picked group of researchers to do the verification, on behalf of the user-base, but that hinges on a "trust me bro" basis. I appreciate you've looked into the process in practice, but please understand that these pieces of software, are anything but simple. Also if a state-actor were to deliberately implement an exploit, it wouldn't be necessarily obvious at all, even if source-code was available; they're state-backed, top of their game security-researchers themselves. Even higher tier consumer-grade computer viruses, won't execute in a virtualized environment, precisely to avoid being detected. They won't compromise when unnecessary, and might only be exploited when absolutely required; again to avoid suspicion.

I fully agree with the last paragraph though, and believe there to be an overreliance on digital systems over all. In terms of FOSS software, you have to rely on many, many different contributors to facilitate maintenance, packaging and distribution in good faith; and sometimes all it takes is just one package, for the whole system to become compromised. But even so, I'm more comfortable knowing, the majority of software I'm running on my machines, to be open-source; than relying on a single entity, like Microsoft, having an abysmal track record in respect of privacy, while doing so in the dark. Of course you could restrict access to Microsoft servers using network filtering, but it's not just that aspect, it's also not having to deal with Microsoft's increasingly restricted experience, primarily serving their perverse dark patterns. I do believe people should handle sensitive files with care, for instance: put Tails on a live-USB, leave it off the internet, put the files on an encrypted drive, dismount the drives physically, and store them somewhere safe.