TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

An open letter to the Linux community

30 点作者 ytch大约 4 年前

5 条评论

freeone3000大约 4 年前
Just because you can't do something ethically doesn't mean you should do it unethically, it means you shouldn't do it. Nobody here seems to have learned anything.
评论 #26930007 未加载
Ygg2大约 4 年前
<p><pre><code> &gt; before running this study; we did that because we knew we could not ask the maintainers of Linux for permission, or they would be on the lookout for the hypocrite patches. </code></pre> I&#x27;ll take BS for 100, Alex.
gus_massa大约 4 年前
Dupe: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=26929470" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=26929470</a> (87 points | 2 hours ago | 76 comments)
MattGaiser大约 4 年前
&gt; we did that because we knew we could not ask the maintainers of Linux for permission, or they would be on the lookout for the hypocrite patches.<p>For you security people out there, how do red teams handle this issue?
jl2718大约 4 年前
Hated as they may be, I believe they’ve changed the way we think about code review. The fact is that there are malicious actors out there, likely far more advanced, and in positions of far greater trust. Modern devops has nearly eliminated human code review in favor of functional unit tests, and security is maybe something considered at release testing. And although the Linux kernel devs may be able to catch these things, there are countless other projects now realizing that they would not have. I don’t think humans can do this. We need to develop better automated tools to test for security in continuous integration of individual commits. For instance, it is normal for CI tools to include functional unit tests for interface implementations, but certainly less so to fuzz every interface as well. I don’t think it’s sufficient to simply fuzz the user inputs. A baked-in exploit would never be discovered that way.