2024-03-30 11:12:49
When suspecting malicious code in a backdoored executable, running that binary to check the version is not advisable. A safer alternative is brew list —versions xz [Link][Link] NEEDS_MORE_RATINGS(14-2-1) Author
2024-03-30 11:56:35
NFE: This is a necessary note, not everyone reads the code and this is a context to prevent people from deliberately running suspicious software, clarifying that is the duty of the person posting. Note is *important context* x.com CURRENTLY_RATED_NOT_HELPFUL(3-2-1) Author
2024-03-30 17:44:08
NNN This is a joke and the account is a well known cyber security specialist who regularly uses sarcasm and satire to ridicule the tech industry. NEEDS_MORE_RATINGS(3-0-2) Author
2024-03-30 21:04:41
macOS is not vulnerable to the xz backdoor, as the malicious script only executes if it was built for “linux-gnu” [Link] NEEDS_MORE_RATINGS(12-1-1) Author
2024-03-30 22:09:19
Running Linux on Mac hardware exposes it to the same vulnerabilities as on native Linux systems. This means a Mac with an M3 chip could be vulnerable to the XZ Utils 5.6.0 or 5.6.1 backdoor if it's running an affected Linux distribution. [Link] NEEDS_MORE_RATINGS(0-0-1) Author