XZ Exploit - Computerphile

Поделиться
HTML-код
  • Опубликовано: 29 дек 2024

Комментарии •

  • @Winsane
    @Winsane 10 дней назад +251

    It is incredible that Andres Freund was able to stop this because he noticed a benchmark took 0.807s instead of 0.299s and decided to investigate. I've heard experts say that if not for him, this could have backdoored every major Linux distribution for a long time.

    • @mal2ksc
      @mal2ksc 10 дней назад +23

      Makes you wonder if it has already happened and we don't know it.

    • @foobarf8766
      @foobarf8766 10 дней назад +20

      No bounties or reward for that guy either afaik, there's a big gap in funding this kinda thing (I'd say more but NDAs)

    • @richardclegg8027
      @richardclegg8027 10 дней назад +4

      Heroic work.

    • @jcd-k2s
      @jcd-k2s 9 дней назад +1

      So how do we know there is no other unknown backdoor?

    • @bucketpizza5197
      @bucketpizza5197 9 дней назад

      @@mal2ksc Based on how it was discovered I wonder if it would have been found if code just had some kind of timeout if to many request was coming in.

  • @NyanSten
    @NyanSten 10 дней назад +79

    The attack was very, very well thought out. It took years for Jia Tan to get accepted as a maintainer, during which time they submitted quite a lot of real improvements, they clearly knew a lot about compression. Moreover they didn't even put the backdoor in the official repository but only in a release tarball. How many people test that the tarball signed by the maintainers is the same as the open source code that everyone can see? And how it got from the test file into the release binary was also very clever. Also AFAIK they were only focusing on Red Hat Linux and possibly also people who compile from sources (like an intelligence agency may do), it got into Debian by accident, Debian normally builds software from official repositories but in the case of xz, they were unusually building it from the release tarball.

    • @chillphil967
      @chillphil967 9 дней назад +9

      my "armchair expert analysis" believes this type of dedication is that of a state sponsored threat level.. would you agree? and even if not, just for fun, which countries are likely contenders ?
      i was wondering if this was from "new" actors, maybe france, lebanon, SK maybe..?

    • @trumpetpunk42
      @trumpetpunk42 8 дней назад

      ​@@chillphil967:ahem:... 5eyes...

    • @autohmae
      @autohmae 8 дней назад

      @@chillphil967 based on the names, it seems like China, but we don't know, it could be a diversion.

  • @JeffBilkins
    @JeffBilkins 10 дней назад +118

    makes you wonder how much stuff is planted out there without getting caught and quietly exploited.

    • @autohmae
      @autohmae 8 дней назад +5

      Sadly, nobody is safe. State actors are the most persistent they don't mind if it takes years to build trust or to pressure someone who already has trust by threatening them or their family or friends. Below that we also got international criminal organizations who would also pressure people. It doesn't matter if it's closed source company infiltration or open source.
      Snowden documents showed this is what NSA for example does.

  • @konga8165
    @konga8165 10 дней назад +63

    It was a Microsoft engineer benchmarking Postgres and saw that the connection times were slower.

  • @ahaveland
    @ahaveland 10 дней назад +68

    xkcd 2347 is one of my favourites - it kind of describes me for the last 30 years too!

    • @hmsthunderchild128
      @hmsthunderchild128 10 дней назад

      Whats your project?

    • @ahaveland
      @ahaveland 9 дней назад +5

      Anti spam and phishing detection and reporting.

    • @richardclegg8027
      @richardclegg8027 9 дней назад +6

      Kudos to everyone heroically maintaining packages with little thanks.

  • @foobarf8766
    @foobarf8766 10 дней назад +75

    This highlights to me how dysfunctional the economics of vulnerability research is, open source devs are making some of the most critical code (even Microsoft relies on it for Xbox) but as passion projects while living on baked beans, never seeing fair recompense. Reporting vulnerabilities often a waste of time too, many vendors don't care or don't pay bounties. Vulnerability research is not being funded properly.

    • @Deilwynna
      @Deilwynna 9 дней назад +9

      not only are companies not paying bounties for found vulnerabilities, they often perma ban the user that report the vulnerability

    • @autohmae
      @autohmae 8 дней назад

      OpenSSH is also part of Windows by the way.

    • @TehNoobiness
      @TehNoobiness Час назад

      And that's if you're lucky! Remember when someone noticed that some local gov't website was leaking the names, addresses, and SSNs of every teacher in the school district, and the governor responded by threatening to throw the people who found it in jail?

  • @SArthur221
    @SArthur221 10 дней назад +437

    worth noting the gaslighting and social engineering aspect of the attack used to get the maintainer to accept Jia Tan as a team member that preceded the backdoor for years!

    • @user4gent416
      @user4gent416 10 дней назад +19

      Yes gaslighting is a manipulation technique. You hit to a great point. It's crazy how they managed to commit to project.

    • @SArthur221
      @SArthur221 10 дней назад +3

      @user4gent416 talk about weird

    • @arashikou6661
      @arashikou6661 10 дней назад

      Yeah! IIRC, it wasn’t just “Jia Tan” who was an agent of the enemy. Didn’t several other xz community members turn out to be sock puppets that were just there to help boost Jia’s standing in the community and advocate for Jia to be granted more power?

    • @Mmmm1ch43l
      @Mmmm1ch43l 10 дней назад +2

      what do you mean by "gaslighting" in this context? just lying?

    • @SArthur221
      @SArthur221 10 дней назад

      @@Mmmm1ch43l no, gaslighting.

  • @tobitei
    @tobitei 10 дней назад +115

    If somebody is wondering why this did not show up at code review, they hid the payload in the testing file and it was only incorporated into the finished binary, which was uploaded to the package servers, so if you would have build this package from source you would not have been susceptible to the attack.
    Also the libxc was overriding code from the sshd when beeing loaded as a static library, there where plans to change the sshd to dynamic library loading, which also would have prevented this attack

    • @petergerdes1094
      @petergerdes1094 10 дней назад +26

      Also it's pretty hard to catch something when the attacker has lead developer credentials on a project without many developers.
      If it hadn't been this way they could have just hidden it in other ways.

    • @syjwg
      @syjwg 10 дней назад +4

      Yes, and finding it was great. It's so important to test every new version compared to others in the same environment. If a "slowdown" occurs, it should be fully examined and understood.

    • @JasonDoege
      @JasonDoege 10 дней назад +7

      Also, code review is not always thorough. Is the bug fixed? Verified? Yes? Moving on...

    •  10 дней назад +2

      Some infrastructure needed to make this exploit work was added with an "optimization" patch that was reverted after the discovery.

    • @syjwg
      @syjwg 10 дней назад

      @JasonDoege Exactly! Especially in projects where just a "quick fix" is needed to solve the problem.

  • @thogameskanaal
    @thogameskanaal 9 дней назад +8

    We went from zero days to patiently, over a long timespan, intentionally planting in vulnerable code to construct a reliable attack vector in another program that relies on this program to be able to hack into all our computers and we are non the wiser...
    This genuinely scares me...

  • @franciscopena7859
    @franciscopena7859 10 дней назад +23

    Xzutils was being loaded only on linux distros, not on openssh itself. It was relied by patches applied to ssh to work with systemd, afaik

    • @richardclegg8027
      @richardclegg8027 10 дней назад +9

      Yeah it was I understand linked through systemd. I thought about mentioning but the video was getting kind of long plus of course there are the systemd haters. :)

    • @trumpetpunk42
      @trumpetpunk42 8 дней назад

      ​@@richardclegg8027f'in SystemdOS...

    • @GertvandenBerg
      @GertvandenBerg 6 дней назад

      @@richardclegg8027 To systemd's credit - they were working on a change to only load that type of libraries when needed, which would have mitigated this issue as well...
      (And this is purely a case of some distros that integrated with systemd by loading a large library instead of writing a small amount of code to notify systemd.) (And the change is not needed to run OpenSSH, but it does give some nice extra functionality)
      OpenSSH is maintained by OpenBSD, which is extremely security aware...

  • @TheRealInscrutable
    @TheRealInscrutable 8 дней назад +6

    This reminds me of Clifford Stoll's story about tracking down an extra $0.75.

  • @TooLazyToFail
    @TooLazyToFail 2 дня назад

    This issue is what finally convinced me to put all my personal stuff behind Tailscale and stop opening ports. This could have been so, so bad.

  • @Lorkin32
    @Lorkin32 10 дней назад +11

    I was hoping for a deep-dive into the obfuscation. Do anyone know if some youtube channel has done an analysis of this yet?

    • @richardclegg8027
      @richardclegg8027 9 дней назад +7

      It is super clever but I did not find any video on it. There is a lot to unpack so it would have been an hour long video that would not really be suitable for computerphile. The best resources I found were blog posts. You can go to the source code but it is hard going.

    • @autohmae
      @autohmae 8 дней назад +1

      RUclips channel low level has this video: secret backdoor found in open source software (xz situation breakdown)

    • @null-0x
      @null-0x 3 дня назад

      fern (documentary type video), LowLevelTV (technical) did cover this topic

  • @JasonDoege
    @JasonDoege 10 дней назад +9

    Insofar as this affects software projects, this can also affect hardware. Imagine a person dedicating this time measured in years getting embedded in a CPU development team and, say, working on a phone SoC or one of the newest microprocessors, injecting nefarious code into the design description.

    • @SmileyEmoji42
      @SmileyEmoji42 10 дней назад +4

      Those things are not normally done by distributed, effectively annonymous, private individuals. There would have to be an presence IRL.

  • @racvets1
    @racvets1 10 дней назад +20

    I can’t imagine if some infrastructure sites like pip, npm, or docker went down, the world would grind to a halt

    • @SeanBZA
      @SeanBZA 10 дней назад +2

      Think of the problems if NTP stratum 1 servers are inoperative, after a day there would be growing chaos all over as timed transactions get out of step.

    • @TurboBorsuk
      @TurboBorsuk 9 дней назад +6

      my grocery store owner is truly terrified of npm going down one day

    • @adissentingopinion848
      @adissentingopinion848 9 дней назад

      ​@@SeanBZAWe would have real Y2K catastrophes like planes falling out of the sky or the electric grid losing frequency lock causing a full blackout

    • @rolfs2165
      @rolfs2165 6 дней назад

      Look up the npm left-pad incident. It was a tiny package that only did what the name says: add spaces to the left of a string. Easy to code yourself. However, it became an integral part of even npm itself - until the dev deleted it and everything came crashing down.

  • @pirat87pl
    @pirat87pl 10 дней назад +10

    Wasn't that comic strip inspired by the leftpad 'incident'?

  • @whtiequillBj
    @whtiequillBj 7 дней назад

    Thank you for this story time.

  • @oldcowbb
    @oldcowbb 9 дней назад +1

    he is such a story teller

  • @jme_a
    @jme_a 9 дней назад +7

    Dr Clegg has such an unusual way of speaking, fascinating story!

  • @0xbitbybit
    @0xbitbybit 10 дней назад +2

    A much more important question:
    Have you read all of those books on your bookshelf?

  • @1ProsperousPlanet
    @1ProsperousPlanet 10 дней назад +14

    What concerns me is, is this the first time they have done this? What about other libraries and other platforms? Hmmm.
    I feel like this would be way harder to find in Windows.

    • @JasonDoege
      @JasonDoege 10 дней назад +5

      True, but harder to execute, as well, because employees go through some level of vetting beyond a skill check. Still, definitely not impossible.

    • @scaredyfish
      @scaredyfish 10 дней назад +7

      Windows is not open source, and the employees are not anonymous, so the methods of attack would need to be quite different. But also, it would be impossible for a member of the public to find the attack.

    • @byrnemeister2008
      @byrnemeister2008 10 дней назад +2

      Wasn’t it a Microsoft employee that found this issue and tracked it down.

    • @SmileyEmoji42
      @SmileyEmoji42 10 дней назад

      Everything depends on third party code these days. Nobody wants to pay to reinvent the wheel

    • @autohmae
      @autohmae 8 дней назад

      Actually, closed source software companies have been attacked like this in the past too. Also hardware companies.

  • @BruceGrembowski
    @BruceGrembowski 10 дней назад +22

    Hiding things in regex can be intentional or by mistyping one character.

    • @smurfyday
      @smurfyday 9 дней назад

      Don't know if you watched the whole video

    • @Xeridanus
      @Xeridanus 9 дней назад

      Mistyping one character usually breaks the entire thing, not overwrites the code as it's compiling.

  • @jamesdecross1035
    @jamesdecross1035 10 дней назад +6

    ‘One key leg’ or ‘wonky leg’

  • @petergerdes1094
    @petergerdes1094 10 дней назад +3

    Is there any system that would be able to flag this kind of unauthorized access if it happened in the wild? Couldn't you have another process that tries to match successful logins to authorized keys for that login (say you've disabled password login) and goes nuts if they don't match?

    • @llearch
      @llearch 10 дней назад +1

      The problem with this is that most such systems work based on the logs that report who logged in - and in this case, the sshd is logging in but not (necessarily) reporting it, so you lose that tracking.

    • @foobarf8766
      @foobarf8766 10 дней назад +1

      Yes AppArmour and SELinux profiles, not new either but commercial pressure would get you laughed at for suggesting to use in any meetings

    • @richardclegg8027
      @richardclegg8027 10 дней назад +3

      In this particular case technically I believe it is not even a login. The key is recognised, the command is run, the results are returned then the ssh continues and the login process fails. So the logger would see a failed access. If you run a server of any size you see a really large number of those.

    • @petergerdes1094
      @petergerdes1094 10 дней назад

      @ Does it launch a shell? Hmm I guess tasks are always spawning those too.

    • @SmileyEmoji42
      @SmileyEmoji42 10 дней назад +1

      There is no succesful login. The malicious code is executed as a side effect of rejecting the login

  • @Serhii_Volchetskyi
    @Serhii_Volchetskyi 9 дней назад

    Could the backdoor be prohibited by App Armor or SE Linux?

    • @autohmae
      @autohmae 8 дней назад +1

      This attack, no. A library is loaded into an application. The things you mentioned are about permissions what a program can do.

  • @WunderWulfe
    @WunderWulfe 9 дней назад

    dependency upon dependency upon dependency, makes work easier, software talking and sharing code with eachother simpler, and solves a lot of problems with maintenance, at a cost to creating exponential liability as every dependency tends to have its own set of dependencies
    partially solved by version locking dependencies, but then what about when they cause bugs for modern systems that may or not be fixed in modern versions? then you have to maintain it yourself at even more cost to your work

  • @Lion_McLionhead
    @Lion_McLionhead 10 дней назад +2

    The quality of contributions lions get is usually bad enough that it doesn't get to exploits.

    • @Xeridanus
      @Xeridanus 9 дней назад

      I thought you mistyped Linux or Linus but then I saw your profile picture. Beautiful mane you have there.

  • @mellertid
    @mellertid 10 дней назад +1

    Lasse is in most cases the nickname for Lars. I've rarely seen it outside the Nordics!

    • @mellertid
      @mellertid 8 дней назад

      Lars officially outnumbers Lasse 100 to 1 in Sweden, but I think more Lars-es than not accept the nickname.

  • @MikelNaUsaCom
    @MikelNaUsaCom 10 дней назад +10

    trust and friendship seems to be a very difficult vector to protect it seems. =D

    • @ToddBurgess
      @ToddBurgess 10 дней назад +6

      I remember hearing years ago the adage you can do more damage with a smile and a handshake than a gun a ski mask

  • @mathman0569
    @mathman0569 10 дней назад +24

    the creator of debian was an animator on toy story

    • @gunrugger
      @gunrugger 10 дней назад +8

      I have found no evidence to support this claim.

    • @Qbe_Root
      @Qbe_Root 10 дней назад +5

      [citation needed]

    • @ClifBratcher
      @ClifBratcher 10 дней назад +7

      Ian Murdock was *not* at Pixar. Bruce Perens is who you're thinking of, but came a bit after its creation.

  • @jamess1787
    @jamess1787 8 дней назад +1

    This guy gave me motion sickness.
    I thought maybe it was the videography, but no its how fidgetty he was. 😂

  • @jared_bowden
    @jared_bowden 6 дней назад

    Very unlikely that this was a single individual: while the account was trying to appear Chinese, there's been analysis of the dates and times that 'Jia Tan' was and wasn't active, and that and some other clues make it look like they were based in Eastern Europe, so the attack was probably taken out by one of Russia's elite hacking groups in conjunction with the Russian State. I mean, the dates and times could _also_ be a red herring, but from what I understand Russian hacking groups are known for performing attacks like these. The NSA probably wouldn't do an attack like this, cause frankly there are probably easier ways it could go about getting a backdoor in major software, like just asking a major American tech corp to add one in (its happened before).

  • @andrewdunbar828
    @andrewdunbar828 9 дней назад +1

    Jia as pronounced more like "jar" than like "gee ah" (with a British accent).

  • @LikelyToBeEatenByAGrue
    @LikelyToBeEatenByAGrue 8 дней назад

    I'm mostly surprised someone was running sid on a large server with tons of traffic. That seems irresponsible.

  • @Xpurple
    @Xpurple 9 дней назад +1

    I live in Nebraska and maintain tiny projects!

    • @Xeridanus
      @Xeridanus 9 дней назад +1

      So you're saying this is all your fault? :P

    • @Xpurple
      @Xpurple 9 дней назад +1

      @@Xeridanus : No, not unless you are using some rather niche russian software :)

  • @uirwi9142
    @uirwi9142 9 дней назад

    absolutely wild!

  • @andljoy
    @andljoy 10 дней назад +6

    Just a clarification , OpenSSH itself was never not secure, it was the linux implementation that was the problem, OpenBSD and others where never impacted as the infrastructure around it is secure by default so the exploit could never work even tho it was there.

  • @xhoques
    @xhoques 10 дней назад +12

    Jia Tan could be a real helper but then some agency just bought over their account. We Taiwanese, on the first frontline to China, have seen that on fan pages and stuffs like that, like A LOT.

    • @BAD_CONSUMER
      @BAD_CONSUMER 10 дней назад

      Wouldn't matter the origin of the name. I don't think anyone believes it was China/Taiwan

    • @Xeridanus
      @Xeridanus 9 дней назад

      @@BAD_CONSUMER Why not? They have the means and motivation.

  • @IvarDaigon
    @IvarDaigon 10 дней назад +1

    I didnt know Ronnie Barker was into computers.

  • @andrewt6801
    @andrewt6801 10 дней назад +5

    And now with the advent of AI code "helpers", I would wager that the subtlety of similar near-undetectable injections will increase tenfold.

    • @kevikiru
      @kevikiru 10 дней назад +6

      This is false. The amount of bad code will increase but not the quality of it. This requires sophisticated coding skills which AI does not + social engineering, which AI is really bad at especially when it is specialists it has to convince.

  • @monkeystealhead
    @monkeystealhead 9 дней назад

    Well the end is a bit unsettling.

  • @eloytoro
    @eloytoro 10 дней назад +59

    Don't like this format where the subject is told like a nighttime story for children and leaving out so many important and interesting details about what happened

    • @aperson1234-t8x
      @aperson1234-t8x 10 дней назад +20

      I think videos like these that highlight that humans are still the biggest weakness in security are perfectly appropriate

    • @Qbe_Root
      @Qbe_Root 10 дней назад +1

      Yeah it's sad that there was more explanation on Debian version names than how someone got libxz to execute a test file in production without pushing anything blatantly malicious

    • @stickydone
      @stickydone 10 дней назад +12

      Honestly I don't think you're the intended audience. The depth you are referring to couldn't fit in 14 minutes. I like an accessible format for people who don't necessarily watch 1hr+ talks about all intrinsic technical details. This bridge should be there to get more people involved

    • @richardclegg8027
      @richardclegg8027 10 дней назад +11

      ​@@stickydoneit is a problem with these videos - what do I assume people know? Some viewers super technical and know the area really well. Some viewers don't know what ssh is. Hard to judge the level. Honestly I could talk for an hour about this hack but nobody would watch it. :)

    • @nodidog
      @nodidog 8 дней назад

      ​@@richardclegg8027 I think people would definitely watch it-perhaps just a different (and probably smaller) audience than the people who watch a summary. It would still be fascinating to people interested in this stuff.

  • @kerniger86
    @kerniger86 10 дней назад

    Omg youtube started to translate the audio 🙉

  • @maizena7646
    @maizena7646 9 дней назад

    His voice reminds me a little of the narrator from The Stanley Parable

  • @OneOfThePetes
    @OneOfThePetes 10 дней назад +4

    I haven't seen that kind of paper since the 80s!

  • @billkendrick1
    @billkendrick1 10 дней назад +3

    When's the feature film adaptation of this story coming? 😅

  • @itsmenewbie03
    @itsmenewbie03 2 дня назад

    Jia Tan Mentioned.

  • @sonOfLiberty100
    @sonOfLiberty100 9 дней назад +1

    How comes that computerphile doesnt even know the difference between backdoor and an exploit 😊-🌴

  • @severgun
    @severgun 10 дней назад +5

    Story to scary kids sitting near fireplace in camp

  • @Uerdue
    @Uerdue 9 дней назад +2

    Just the other day, I read about North Koreans working (remotely and under false names) for US tech companies, trying to eventually steal confidential information, plant backdoors or install ransomware. They've apparently also been quite dedicated, delivering high-quality code for years in order to "gain trust" first. As the problem became more known in the US, they were said to have been shifting towards Germany in the past months.
    The level of dedication is similar to that of Jia Tan, but it could ofc still be pretty much anyone behind that.

  • @martinprince8253
    @martinprince8253 10 дней назад +1

    AND I WOULD'VE GOTTEN AWAY WITH IT, IF IT HADN'T BEEN FOR YOU MEDDLING DEVELOPERS!

  • @joshix833
    @joshix833 10 дней назад +8

    Could you please deactivate the automatic ai translations? They are annoying

    • @danbopes6699
      @danbopes6699 10 дней назад

      I think that's through RUclips, and you can disable that on your end on the top right by clicking the CC button.

    • @joshix833
      @joshix833 10 дней назад

      @danbopes6699 doesn't work on my phone. The dubbing is annoying

    • @drooplug
      @drooplug 10 дней назад

      ​@@joshix833Go to settings > audio

    • @1.4142
      @1.4142 10 дней назад +1

      Click the cogwheel, then audio track (6), then english.

    • @m4ng4n
      @m4ng4n 10 дней назад

      yeeeees

  • @simpletongeek
    @simpletongeek 10 дней назад +4

    This reminds me of the Source Forge incident where somebody pulled his code of removing spaces at the ends of a string, and brought half of the internet down.

    • @pippinproductions
      @pippinproductions 10 дней назад +14

      it was on NPM and the package was called left pad, the author was disgruntled because NPM was forcing him to give his kik repo to the company kik

    • @memofromessex
      @memofromessex 10 дней назад

      I was thinking the same!

  • @ImageJPEG
    @ImageJPEG 10 дней назад

    Oh boy, the OpenBSD devs are gonna be pissed!

  • @pratikkore7947
    @pratikkore7947 День назад

    social engineering at its finest

  • @vepeu
    @vepeu 10 дней назад +2

    when does an echo system become an eco system?

  • @JohnNada128
    @JohnNada128 10 дней назад

    Ok, it doesn't surprise me at all.

  • @dropkoning
    @dropkoning 10 дней назад

    Is he a bit pissed? He doesn't act like usual.

    • @richardclegg8027
      @richardclegg8027 9 дней назад +4

      Assure you I am sober. This was recorded ten minutes before "the goodbye problem" video if you want to compare even if they are shown the other way round. :)

  • @somiltyagi7127
    @somiltyagi7127 10 дней назад

    Got late, thanks for refreshing it 😊

  • @InDeepPudding
    @InDeepPudding 5 дней назад +2

    I used to watch computerphile back in the day for detailed explanations of exploits and neat things with computers, now though I feel like they just restate the news but months late and in worse detail, adding nothing new :(

  • @robmckennie4203
    @robmckennie4203 9 дней назад

    "unstable" 🤣

  • @phpn99
    @phpn99 10 дней назад +10

    His narrative is meandering and convoluted. This is a much simpler story.

    • @nicnl255
      @nicnl255 10 дней назад +4

      I agree. I stopped watching before the fifth minute due to how unsufferable the storytelling was.

    • @backwashjoe7864
      @backwashjoe7864 10 дней назад

      ​@@nicnl255 Same. His talking style and mannerisms are eerily similar to a guy that I used to work with in IT. Both creepy.

    • @SmileyEmoji42
      @SmileyEmoji42 10 дней назад

      Depends how much you understand, or want to understand, software and the build processes

    • @nicnl255
      @nicnl255 9 дней назад +1

      ​@@SmileyEmoji42 Your point makes no sense.
      I'm LITERALLY an IT scientist, software and build processes IS my daily job.
      It doesn't change anything: the guy's storytelling was atrocious.

    • @johnwilburn4445
      @johnwilburn4445 8 дней назад +1

      Thought it was colorful and entertaining. I would've just googled if I wanted a robotic summary.

  • @unvergebeneid
    @unvergebeneid 10 дней назад

    No telnet? But what if I sit in Siberia and I have only telnet?

    • @richardclegg8027
      @richardclegg8027 9 дней назад

      Then you don't get into any computer I run. :)

    • @unvergebeneid
      @unvergebeneid 9 дней назад

      @@richardclegg8027 Really disappointed that this gem of internet history doesn't seem to ring anyone's bell anymore. What do kids learn in school today? ;D It's still worth looking up though. Just Google "I sit in Siberia and I have only telnet."

  • @D1ndo
    @D1ndo 8 дней назад

    This was such an oversimplified explanation, it misses a few critical points. Well, what did I expect, it's like most of computerphile videos, guess I'm not the right audience.

  • @guilherme5094
    @guilherme5094 10 дней назад

    👍

  • @raoulmapoule
    @raoulmapoule 10 дней назад

    PLEASE DEACTIVATE AUTODUBING IT IS SO BAD

  • @slalomsteve
    @slalomsteve 10 дней назад +15

    Sorry the buildup is far too slow. Got bored and left after 7 minutes of being told nothing.

    • @PaulaBean
      @PaulaBean 10 дней назад +1

      You can speed up RUclips videos with the '>' key. At 1,5x the normal speed the video only takes 10 minutes, but even then I have the idea that the story can be told in 2 minutes, because it is very shallow.

    • @notetaking9308
      @notetaking9308 10 дней назад +2

      Not an airport, mate

  • @2Fast4Mellow
    @2Fast4Mellow 9 дней назад

    The KGB deployed sleeper agents that were dormant sometimes for decades. So, for a state actor a period of 2 to 3 years is really just short term...

  • @dextardextar
    @dextardextar 10 дней назад

    LOL

  • @alyme_r
    @alyme_r 10 дней назад

    nice

  • @custard131
    @custard131 10 дней назад +4

    no way is this an individual, imo the question is just which state was behind it, and realistically i think there are only 3 options and if i had to put money on which of those i would say USA/NSA

    • @135million
      @135million 10 дней назад +1

      Dart*

    • @ChrisSeltzer
      @ChrisSeltzer 10 дней назад +11

      If you're familiar with this story you'd know that it's almost certainly not the US

    • @ircubic
      @ircubic 10 дней назад +9

      From what I remember reading about it at the time, the times the malicious user was sending emails, as well as other things like commit timestamps, would align with someone working a 9-5 out of eastern europe or western russia. That could, of course, just be another smoke screen.

    • @ChrisSeltzer
      @ChrisSeltzer 10 дней назад +18

      ​@ircubic the timezones of their commits where all set to China's timezone but their activity lined up perfectly with someone working a 9-5 in Eastern Europe. There were a few commits made a minute or two apart where they were in the Russian timezone then suddenly in China, indicating they forgot to turn on a VPN for the first commit.
      The language of their computer was set to Russian. They notably took off Russian (not Chinese) holidays.
      There were small grammatical mistakes in English that would be common for a native Russian speaker to make but not a native Chinese speaker.
      All signs point to Russia's APT29 being the culprit.

    • @petergerdes1094
      @petergerdes1094 10 дней назад +1

      Unlikely to be us/nsa but don't rule out a lone motivated individual who thinks they can steal 50 million in Bitcoin this way or just wants to see what their ex is up to.

  • @ieframe
    @ieframe 10 дней назад +2

    Referring to a project which is being utilized in a lot of prominent software as a "wonky leg" is very disheartening to hear.
    Open source projects are ungrateful to maintain as is, and some proper recognition to the maintainer and person who discovered the backdoor would have been nice.

    • @realroadrunnr
      @realroadrunnr 10 дней назад +5

      I think you’re taking it the wrong way. The project is a wonky leg because it doesn’t get the support it should due to its importance and widespread use. It isn’t a comment on the maintainer’s work but on the vulnerability that having only one guy taking care of it in their spare time brings with it.

    • @ieframe
      @ieframe 10 дней назад +2

      ​@@realroadrunnrI understand where you are coming from, but I feel like minimizing somebody's work using a meme without properly explaining issues and abuse of these projects is just silly.
      Threat actors are able to plant themselves into these projects precisely because nobody cares to bring attention to how overworked and underappreciated these developers are.
      But then again this video is just for entertainment.

    • @realroadrunnr
      @realroadrunnr 10 дней назад +3

      @ you are right, he could’ve (and should’ve) spent more time on explaining what the actual issue was in terms of “how could this even happen?”.

    • @richardclegg8027
      @richardclegg8027 10 дней назад +1

      I am referring to xkcd 2346 if you want to see what I am getting at which is explicitly about how under appreciated that maintainer is.

  • @vlycop7404
    @vlycop7404 10 дней назад +7

    i love your video, but I find it very sad that the person who found it, Andres Freund, and the developer of XZ i can't even find the name, are not mentioned by name.
    This is very important, It's passionate individual who save the world... and they get nothing in return :(

    • @omgsrsly
      @omgsrsly 10 дней назад +20

      12:21

    • @jimbolino
      @jimbolino 10 дней назад +7

      watch again, they are both mentioned

    • @richardclegg8027
      @richardclegg8027 9 дней назад +2

      I name both the developer Lasse Collin and the person who found the hack Andres Freund in the video. I may pronounce them badly but I made sure I did name both as both do an excellent job in different ways in this story.

  • @MustafaKalafat
    @MustafaKalafat 10 дней назад +2

    I wonder whether current AI technology and models can review the codes in terms of security and efficiency.

    • @crashingflamingo3028
      @crashingflamingo3028 10 дней назад +11

      I think the false-positive rate is quite high at the moment.

    • @jme_a
      @jme_a 10 дней назад +1

      It's already been happening for at least 18 months or so

    • @scheimong
      @scheimong 10 дней назад +19

      Lol people talk like AI is somehow a technical genius. Brother, current AIs (if you can call them that) are trained on random internet data produced by random internet users. And as we should all recognise, most internet users are not smart people.

    • @lbgstzockt8493
      @lbgstzockt8493 10 дней назад

      I would guess so, Atleast with AI you can throw as many resources at it as you want whereas human only have so much time and interest in reviewing OSS.

    • @JeffBilkins
      @JeffBilkins 10 дней назад +4

      But who will be reviewing the AI?

  • @delakintomiwa
    @delakintomiwa 10 дней назад +3

    First comment

  • @awjaaa
    @awjaaa 10 дней назад

    * "day-mon"