📰 Linux XZ Utils Backdoor Attribution Analysis
HTML-код
- Опубликовано: 13 сен 2024
- 🚨 ALERT: * Linux Backdoored XZ Utils (xz-utils)* How This Was Pulled Off, And Who May Have Done It? This Was A Backdoor In Layers - Many Changes Of Lesser Alarm, Together, Critical Remote Access, Compromised SSHD, Risking Countless Linux Servers / Computers Worldwide.
I'm Leaning Towards Nation-State Actors Theory (group carrying out multiple tasks), And Share My Analysis Today On This Vital FOSS Story.
SHARE THIS ON SOCIAL MEDIA TO SUPPORT CHANNEL
Bringing you 100% independent content, aiming to introduce to you the most honest, unfiltered security & privacy content on the net. Hopefully youtube / google will recognize it, and help this channel grow!
Thanks for sharing this and all videos. It's a HUGE help reposting these videos!
SUPPORT INDEPENDENT CONTENT BY SHARING / OPTIONS BELOW
SHARE YOUR THEORY / THOUGHTS IN COMMENTS
Join me today in this. Leave a comment, share a thought.
EMAIL: righttoprivacy[at]tutanota.com / righttoprivacy[at]i2pmail.org
(VIDEO SHARED EARLY ON PUBLIC BLOG: bmc.link/polit...)
Watch, And Share With Others!
#Linux #cyber #xz
I create independent content to keep you informed, share unique tips (many, completely original ideas, many, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics.
If you learn something here, consider supporting below (sharing a video on social media is another great way to support this, motivating more time to new content)
💎 THANK YOU FOR CONSIDERING SUPPORTING THIS CHANNEL
💻 LAPTOP (coreboot / Intel ME neutered): bmc.link/polit... (options)
MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM
CASHAPP - cash.app/$Huma...
MEMBERSHIP: bmc.link/polit... (early / exclusive / more)
SUPPORT OPTIONS (LIST): bmc.link/polit...
*PUBLIC BLOG:* bmc.link/polit...
First shared on public blog: buymeacoffee.c... (follow blog for free and / or optionally support this work)
📬 CHANNEL EMAIL CONTACT: righttoprivacy[at]tutanota.com
📬 CONTACT RTP (i2pmail): righttoprivacy[at]mail.i2p (I2P internal mail)
18:18 that’s crazy. Spot on man!
Intelligent guy. Just stumbled upon this video. It was good to see someone not just default to saying it was China but also not leaving out that possibility due to the varying layers of subterfuge possible in this kinds of plots. Gotta sub for great content like this
Appreciate your support on this! Might make a follow up if I find new information. Thank you for the great feedback and thanks for the sub. :)
It also shows, monitoring unusual processor levels in diverse conditions for detecting backdoors and trojans must be a standard and automatized way of testing!
This is a good idea. I had similar thoughts when making this video, thanks for your comment!
Great breakdown
Thank you. Your feedback is much appreciated Rob!
13:00 I agree those were fake comments to get him stressed out and probably fake comments praising villain to make him look reliable in the fake bot community so he felt okay giving it over
100%. I find it hard to believe they weren't involved. Just goes to show the lengths groups will go to, to achieve objectives.
Even if low probability, you cannot discard the hypothesis that NSA was involved.
But all others you mentioned look more likely.
In any case, I agree it's a state-sponsored operation.
And pretty worrying.
I certainly haven't discarded that possibility. 😉 And it does make one wonder, what might have slipped by? 🤔
@@RTPTechTips : That discover was so by chance...
There might be 3 exploits of same level of complexity that are everywhere but unnoticed...
Yeah, we can wonder...
Thank you for the excellent coverage!
Hey thanks for watching Ed! Appreciate your support of the channel / feedback.
They are afraid of the year of the linux desktop and linux becoming more popular then Windows and macOS.
As in psychological operations, persuade, change, influence. If you can't beat them, infiltrate them. ;)
Microsoft has put back doors all over linux.
They are just keeping it, (as windows says under machine info) "This System Monitored and protected". 😛
Embrace, Extend, Extinguish.