this post was submitted on 23 Apr 2026
613 points (99.5% liked)

Selfhosted

58738 readers
1373 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

  7. No low-effort posts. This is subjective and will largely be determined by the community member reports.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] stardreamer@lemmy.blahaj.zone 6 points 1 day ago* (last edited 1 day ago) (1 children)

And how would apt help in this particular case? A supply chain attack can happen with any particular package manager. In this case, the compromised package was detected and mitigated within 93 minutes, affecting a total of ~330 users. Which is a lot better than how a lot of distros handled the xz breach last year.

All reasonably secure package managers (and https) operate on a chain of trust. There is little that can be done if that chain of trust is broken.

Based on this the cause was a malicious VSCode extension that stole credentials that were later used to trigger a deployment CI/CD pipeline. If there's anything to learn from this, it's probably to not use VSCode.

[–] quick_snail@feddit.nl 2 points 1 day ago (1 children)

With cryptography. X.509 is trash. They should pin the public key.

[–] stardreamer@lemmy.blahaj.zone 3 points 1 day ago (1 children)
  1. If your assumption is that X509 is trash, does that mean you hold the same amount of distrust to TLS?
  2. How do you propose the scaling of key management? Do you have a reasonable alternative to users blindly trusting every single key they come across?
  3. Back to my original question: what prevents a VSCode extension from stealing a private signing key (as opposed to an API key) and causing the same issues described here?
[–] quick_snail@feddit.nl 1 points 20 hours ago (1 children)

TLS is fine with certificate pinning m

[–] stardreamer@lemmy.blahaj.zone 1 points 19 hours ago

That still leaves two out of three questions unanswered. Most importantly the last one, which was addressed towards the original complaint.