Рет қаралды 269,762
The xz exploit pushed the limits of social engineering, code obfuscation, package distribution and more. I'm concerned the important parts aren't being covered, so I decided to do a vid
FOLLOW LOW LEVEL: @LowLevelLearning
This blog post carried the video:
robmensching.com/blog/posts/2...
Follow Rob as well: / robmen
Maintainer's blog post: tukaani.org/xz-backdoor/
Diagram: / 1774342248437813525
S/O Ph4se0n3 for the awesome edit 🙏