Linux vulnerable to infiltration

    Date03 May 2004
    3847
    Posted ByAnthony Pell
    Provocatively titled "'Many Eyes' - No Assurance Against Many Spies," the paper claims to debunk the fallacy giving "many eyes" access to Linux source code ensures that it's free of Trojan horses or other malicious software. . . . Linux source code could be infiltrated by dubious elements, including spies, according to a white paper released by Dan O'Dowd, CEO of Green Hills Software Inc.

    This is O'Dowd's second white paper in a series that his company describes as being focused on "the urgent security threat posed by the use of the Linux operating system in U.S. defense systems, including the Future Combat System and Global Information Grid."

    Provocatively titled "'Many Eyes' - No Assurance Against Many Spies," the paper claims to debunk the fallacy giving "many eyes" access to Linux source code ensures that it's free of Trojan horses or other malicious software.

    You are not authorised to post comments.

    LinuxSecurity Poll

    Has your email account ever been pwned in a data breach?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /component/communitypolls/?task=poll.vote
    12
    radio
    [{"id":"53","title":"Yes","votes":"5","type":"x","order":"1","pct":83.33,"resources":[]},{"id":"54","title":"No","votes":"1","type":"x","order":"2","pct":16.67,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.