
Sign up to save your podcasts
Or


Gabriel Custodiet speaks with Urban Hacker about the infamous XZ backdoor incident by which a key piece of software in the Linux kernel was nearly hijacked. The attacker spent four years slowly ingratiating himself into the small community, which had been selected precisely because it consisted of a single burned-out developer. Follow us as we unravel this bizarre and disturbing story of premeditated digital attack and what it means for free and open-source software and our own cybersecurity.
Mentioned →https://urbanhacker.net/a-closer-look-at-the-social-engineering-behind-the-xz-backdoor-part-one/ →https://en.wikipedia.org/wiki/XZ_Utils_backdoor
Guest Links → https://urbanhacker.net/ → https://twitter.com/realUrbanHacker → https://t.me/Realurbanhacker (Telegram) → https://tallycoin.app/@realurbanhacker/the-orange-pill-simulator-zzjq3lmF (Urban Hacker's Bitcoin game)
MY PREMIUM NEWSLETTER → http://watchmanstorch.com → Join my exclusive privacy community
MY PRIVACY TUTORIALS → https://escapethetechnocracy.com/ (including consulting) → https://watchmanprivacy.com (Gabriel's personal site) → https://twitter.com/watchmanprivacy
SUPPORT INDEPENDENT GONZO TECHNO-ADVENTURE JOURNALISM → No sponsors. No ads. Just truth. → https://watchmanprivacy.com/donate.html
Timeline 0:00 – Introduction 2:25 – What is XZ Utils? 4:17 – How does GitHub work? 15:15 – Summary of XZ Utils backdoor incident 18:00 – Social engineering 21:00 – Technical implementation of the backdoor attack 28:00 – Potential consequences of this attempted attack 30:10 – How was it found? 33:00 – Does this expose a major weakness of FOSS? 38:25 – Similar supply chain cyber attacks 43:00 – Final thoughts
#XZBackDoor #UrbanHacker #WatchmanPrivacy
By Gabriel Custodiet4.7
7474 ratings
Gabriel Custodiet speaks with Urban Hacker about the infamous XZ backdoor incident by which a key piece of software in the Linux kernel was nearly hijacked. The attacker spent four years slowly ingratiating himself into the small community, which had been selected precisely because it consisted of a single burned-out developer. Follow us as we unravel this bizarre and disturbing story of premeditated digital attack and what it means for free and open-source software and our own cybersecurity.
Mentioned →https://urbanhacker.net/a-closer-look-at-the-social-engineering-behind-the-xz-backdoor-part-one/ →https://en.wikipedia.org/wiki/XZ_Utils_backdoor
Guest Links → https://urbanhacker.net/ → https://twitter.com/realUrbanHacker → https://t.me/Realurbanhacker (Telegram) → https://tallycoin.app/@realurbanhacker/the-orange-pill-simulator-zzjq3lmF (Urban Hacker's Bitcoin game)
MY PREMIUM NEWSLETTER → http://watchmanstorch.com → Join my exclusive privacy community
MY PRIVACY TUTORIALS → https://escapethetechnocracy.com/ (including consulting) → https://watchmanprivacy.com (Gabriel's personal site) → https://twitter.com/watchmanprivacy
SUPPORT INDEPENDENT GONZO TECHNO-ADVENTURE JOURNALISM → No sponsors. No ads. Just truth. → https://watchmanprivacy.com/donate.html
Timeline 0:00 – Introduction 2:25 – What is XZ Utils? 4:17 – How does GitHub work? 15:15 – Summary of XZ Utils backdoor incident 18:00 – Social engineering 21:00 – Technical implementation of the backdoor attack 28:00 – Potential consequences of this attempted attack 30:10 – How was it found? 33:00 – Does this expose a major weakness of FOSS? 38:25 – Similar supply chain cyber attacks 43:00 – Final thoughts
#XZBackDoor #UrbanHacker #WatchmanPrivacy
1,888 Listeners

577 Listeners

1,775 Listeners

439 Listeners

3,365 Listeners

934 Listeners

499 Listeners

776 Listeners

430 Listeners

322 Listeners

372 Listeners

1,826 Listeners

123 Listeners

20 Listeners

31 Listeners