• theunknownmuncher@lemmy.world
      link
      fedilink
      English
      arrow-up
      10
      ·
      edit-2
      1 day ago

      Huh? I have never claimed they are?

      In cybersecurity, perfect is not a thing. You can only mitigate risks within a threat model.

      • Cypher@aussie.zone
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        5
        ·
        1 day ago

        To be fair you didn’t say package managers were perfect but you also failed to provide any evidence for your claims that a package manager was more trustworthy than a known software publishers website as a distribution method.

        You were given plenty of opportunities to explain yourself and you doubled down with insults and shifting goalposts.

        Going by your logic this breach is evidence that package managers should all be avoided.

        • theunknownmuncher@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          arrow-down
          1
          ·
          edit-2
          1 day ago

          I also never used insults… maybe you’re recalling the posts where you called me a “clown” and “fuckwit”?

          I only stated that there are more security problems for the average user related to: doing a web search, clicking the first link, and executing a basically random binary downloaded from some website, ie the standard way of downloading software on windows; than there is to using a package manager.

          I clearly acknowleged that both package managers and the windows method are vulnerable to supply chain attacks.

          You just wanted to create an argument, and it’s genuinely hilarious that it’s still in your mind. I had forgotten you existed 😂

          Going by your logic

          You do quite a lot of talking for me and telling me what my position/logic is. It’s almost like you’re arguing with yourself rather than any of the points I’ve stated. Well, enjoy arguing with yourself still, somehow.

          • Cypher@aussie.zone
            link
            fedilink
            English
            arrow-up
            1
            ·
            edit-2
            23 hours ago

            If you don’t see calling someone ignorant as an insult then I wish you well in a pub talking to a stranger.

            I had a chuckle when I saw NPM yet again because it was one of the examples I used that you failed to address despite totally winning that discussion.

            Hopefully manufacturing irrelevant scenarios works out for you in your career.

            I absolutely believe you forgot your what, 5 or 6 comments arguing about this, goldfish much?

            • theunknownmuncher@lemmy.world
              link
              fedilink
              English
              arrow-up
              1
              arrow-down
              1
              ·
              edit-2
              23 hours ago

              NPM yet again because it was one of the examples I used that you failed to address

              I clearly acknowleged that both package managers and the windows method are vulnerable to supply chain attacks.

              I’m pretty sure I noted your demonstated lack of reading comprehension, not ignorance. Doesn’t seem to have improved in the last 2 weeks.

              Hopefully manufacturing irrelevant scenarios works out for you in your career.

              That’s ironic.

              • Cypher@aussie.zone
                link
                fedilink
                English
                arrow-up
                1
                ·
                23 hours ago

                If you can’t comprehend how site impersonation and search result manipulation aren’t relevant to the actual software vendor getting popped then you have zero comprehension of an actual kill chain.

                But sure a package manager is totally safer because you made up an irrelevant scenario!

                Nice you went back and checked with how little you cared lol