Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Because in the closed source model the frustrated developer that looked into this SSH slowness submits a ticket for the owner of the malicious code to dismiss.


It’s insane to consider the actual discovery of this to be anything other than a lightning strike. What’s more interesting here is that we can say with near certainty that there are other backdoors like this out there.


Time to start looking at similar cases for sure.


This seems completely unrelated to the grandparent comment’s mention of open source LLMs


You're right, I read the comment as:

> Imagine a future where state actors have hundreds of AI agents fixing bugs, gaining reputation while they slowly introduce backdoors. I really hope open source () succeed.

I guess we can only hope verifiable and open source models can counteract the state actors.


Not necessarily. A frustrated developer posts about it, it catches attention of someone who knows how to use Ghidra et al, and it gets dug out quite fast.

Except, with closed-source software maintained by a for-profit company, suck cockup would mean a huge reputational hit, with billions of dollars of lost market cap. So, there are very high incentives for companies to vet their devs, have proper code reviews, etc.

But with open-source, anyone can be a contributor, everyone is a friend, and nobody is reliably real-world-identifiable. So, carrying out such attacks is easier by orders magnitude.


> So, there are very high incentives for companies to vet their devs, have proper code reviews, etc.

I'm not sure about that. It takes a few leetcode interviews to get in major tech companies. As for the review process, it's not always thorough (if it looks legit and the tests pass...). However, employees are identifiable and would take huge risk to be caught doing anything fishy.


Absolutely not. Getting a job at any critical infrastructure software dev company is easier than contributing to the Linux kernel.


Can confirm. I may work at Meta, but I was nearly banned from contributing to an open source project because my commits kept introducing bugs.


We witnessed Juniper generating their VPN keys with Dual EC DRGB, and then the generator constants subverted with Juniper claiming of now knowing how did it happen.

I don’t think it affected Juniper firewall business in any significant way.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: