GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Embed Notice

HTML Code

Corresponding Notice

  1. Embed this notice
    blake shaw 🇵🇸 (rml@functional.cafe)'s status on Thursday, 05-Oct-2023 02:56:35 JSTblake shaw 🇵🇸blake shaw 🇵🇸
    in reply to
    • Alexandre Oliva

    @lxo I don't think its so simple as starting from two independent compiler binaries. with Thompson's attack, the trick was of course a matter of introducing changes to what constitutes legal C code in phases, so that a seed compiler has been "trained" to interpret the backdoor of an attacker as legal C code, and that "knowledge" is then propagated from binary to binary, without the user's knowledge. and its not just GCC, but also coreutils, binutils, glibc and others that make up around 200mb of boostrap binaries on any given free operating system distribution. if you recompile these tools with pcc or clang, from source and then again with GCC, all coming from different distributors, you're just assuming that one of compilers breaks the chain of the attack. but nothing actually suggests that, considering those tools are all similarly built from blobs that may contain generational backdoors. you have to trust not only your source, but whatever they trusted as well.

    this isn't purely hypothetical, these attacks have been uncovered in the wild it https://www.wired.com/2009/08/induc/

    In conversationThursday, 05-Oct-2023 02:56:35 JST from functional.cafepermalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: media.wired.com
      Malware Turns Software Compilers into Virus Breeders
      from Kevin Poulsen
      Security experts seem more intrigued than alarmed over a newly-discovered virus that inserts itself into a Delphi compiler, and replicates itself in every program compiled. Sophos says its seen 3,000 instances of the Induc virus in the wild, where it’s popped up in some production software. “This makes us believe that the malware has been […]
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.