78
submitted 1 week ago* (last edited 1 week ago) by Fedpie@sopuli.xyz to c/privacy@lemmy.ml
you are viewing a single comment's thread
view the rest of the comments
[-] quack@lemmy.zip 18 points 1 week ago* (last edited 1 week ago)

That doesn’t make you safe from supply chain attacks generally. There’s no reason a supply chain attack couldn’t be applied to software repos you do use if a vulnerability exists within them and a bad actor is sufficiently motivated to exploit it.

this post was submitted on 24 Apr 2026
78 points (98.8% liked)

Privacy

48317 readers
243 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 6 years ago
MODERATORS