• 0 Posts
  • 13 Comments
Joined 1 year ago
cake
Cake day: August 15th, 2023

help-circle


  • Pretty much impossible, especially with so many eyes on the project. It is possible to intentionally introduce vulnerabilities into open source code and use that as a backdoor but for projects like tor keeping that hidden for long periods of time is incredibly difficult due to the number of people independently auditing the code.







  • Yes Stable Linux variants (also known as distros) are very widely used, and range from Linux mint which is completely stable with no issues for day to day use (assuming you don’t use an Nvidia card) to Debian which which has a selling point of not changing anything beyond security updates for like 6 years straight

    Most people here will be talking about there bleeding edge systems which will use code that is often in beta or use systems so new they don’t have proper documentation (the bcachefs file system which showed up last month comes to mind).