I guess you should trust NPM though because its a package manager!
You’re just encouraging people to blindly use and trust repos with no understanding of the pros or cons, and without understanding how you can verify and test software yourself to reduce risk. This is especially an easy conversaion when we talk closed source vs open source and you failed to even bring that up.
Repeating nonsense claims instead of actually considering the entirely reasonable question only highlights that you’re victim to the Dunning-Kruger effect.
You could have had a conversation and learned something from an actual cyber security professional and instead you’ve acted like a clown.
You’re so close to understanding. All of the flaws that come with supply chain attacks on repos also apply to random websites, plus even more flaws that repositories are not as susceptible to or do not apply to repos at all.
Please quote me where I claimed that software repositories are less vulnerable to supply chain attacks.
You were wrong about something, constructed a strawman argument, and are grasping at straws to save face.
Are you done speed-running through as many logical fallacies as possible? Multiple strawman arguments, no true scottsman/appeal to authority, name calling/ad hominem. You wouldn’t have to resort to these if you were just correct, like me.
Since you don’t understand, you lowered the level of the conversation and now I’m going to continue on that level because you get what you deserve.
Ad hominem is a problem now when you started accusing me of lacking reading comprehension aka stupidity and then ignorance - in a field I am a professional in and have given reasoned and valid advice on.
In multiple replies you failed to even attempt to address the elephant in the room; that you have zero fucking clue how to verify that applications delivered from a repo aren’t malicious.
Given a real world example you simply ignore it “but search results” eat shit you moron. The legitimate website was popped so “rAnDoM wEbSiTeS” aren’t a factor or relevant.
JuSt TrUsT iT bRo - nonsense uttered by an absolute fuckwit
Addressing logical fallacies elevates the discussion to place where it can actually be productive, not lowers it.
In multiple replies you failed to even attempt to address the elephant in the room; that you have zero fucking clue how to verify that applications delivered from a repo aren’t malicious.
It’s not relevant because it applies to both random websites and code repositories equally. Again, please quote me where I claimed that code repositories are not susceptible to this.
Ad hominem is a problem now when you started accusing me of lacking reading comprehension aka stupidity and then ignorance
You’ve demonstrated both of these, so it is just statement of fact. “you moron” this you?
It doesn’t matter if the software is delivered via a publishers website or via a package repository if the supply chain has been compromised.
Clearly you’re not aware of any recent cyber security news or you’d know that the NPM package manager has suffered numerous attacks: https://www.bleepingcomputer.com/news/security/shai-hulud-malware-infects-500-npm-packages-leaks-secrets-on-github/
I guess you should trust NPM though because its a package manager!
You’re just encouraging people to blindly use and trust repos with no understanding of the pros or cons, and without understanding how you can verify and test software yourself to reduce risk. This is especially an easy conversaion when we talk closed source vs open source and you failed to even bring that up.
Repeating nonsense claims instead of actually considering the entirely reasonable question only highlights that you’re victim to the Dunning-Kruger effect.
You could have had a conversation and learned something from an actual cyber security professional and instead you’ve acted like a clown.
ItS nOt PeRfEcT sO iT cAnT bE bEtTeR
Cope.
hehehe seethe about it clown
You’re so close to understanding. All of the flaws that come with supply chain attacks on repos also apply to random websites, plus even more flaws that repositories are not as susceptible to or do not apply to repos at all.
Please quote me where I claimed that software repositories are less vulnerable to supply chain attacks.
You were wrong about something, constructed a strawman argument, and are grasping at straws to save face.
rAnDoM wEbSiTeS
That’s what I thought.
Are you done speed-running through as many logical fallacies as possible? Multiple strawman arguments, no true scottsman/appeal to authority, name calling/ad hominem. You wouldn’t have to resort to these if you were just correct, like me.
Since you don’t understand, you lowered the level of the conversation and now I’m going to continue on that level because you get what you deserve.
Ad hominem is a problem now when you started accusing me of lacking reading comprehension aka stupidity and then ignorance - in a field I am a professional in and have given reasoned and valid advice on.
In multiple replies you failed to even attempt to address the elephant in the room; that you have zero fucking clue how to verify that applications delivered from a repo aren’t malicious.
Given a real world example you simply ignore it “but search results” eat shit you moron. The legitimate website was popped so “rAnDoM wEbSiTeS” aren’t a factor or relevant.
JuSt TrUsT iT bRo - nonsense uttered by an absolute fuckwit
Addressing logical fallacies elevates the discussion to place where it can actually be productive, not lowers it.
It’s not relevant because it applies to both random websites and code repositories equally. Again, please quote me where I claimed that code repositories are not susceptible to this.
You’ve demonstrated both of these, so it is just statement of fact. “you moron” this you?
get ratiod fuckwit