Remember people, if newpipe give error when try to play a video, just turn your phone horizontally and vertically until the error leave. Is really easy

  • N0x0n
    link
    fedilink
    arrow-up
    2
    ·
    6 hours ago

    From what I understand, F-droid regularly audits a few new apps for malicious code

    That’s a good point, but how can a malicious code be add to a source code from github? I mean if you only use trusted applications repos (most of them are already on f-droid anyway) there shouldn’t be any concern right?

    But reading from the link you posted there’s some chance of a MITM attack and send a malicious payload directly to Obtainium? (Correct me if I’m wrong).

    Github is not neccesarily the same source used to generate their binaries.

    Didn’t knew that :/

    Thanks for sharing your knowledge !

    • tetris11
      link
      fedilink
      arrow-up
      1
      ·
      edit-2
      5 hours ago

      Welcome!

      I mean if you only use trusted applications repos

      Trusting an application means trusting every developer who has contributed to its codebase. The XZ attack showed that it just takes one pushy contributor to completely expose an attack surface.

      The only thing you can really trust is applications that you build yourself and can personally vet the source for. No one does that of course, so we place some trust in authorized developers (e.g. archlinux-keyring) who have been vetted by their various organisations. With Github, no such vetting occurs, it’s just some guy/girl hosting their code.

      MITM attack to Obtainium

      I have to admit I don’t know much about the security that Obtainium uses. I’m hoping everything is TLS certified to make MITM difficult, but I don’t know those details. All I do know is that you’re getting binaries hosted by someone on github who might have zero cred in FOSS circles.