| Website | https://daniel.micay.dev |
| https://twitter.com/DanielMicay | |
| GitHub | https://github.com/thestinger |
| Matrix | https://matrix.to/#/@strcat:grapheneos.org |
| Website | https://daniel.micay.dev |
| https://twitter.com/DanielMicay | |
| GitHub | https://github.com/thestinger |
| Matrix | https://matrix.to/#/@strcat:grapheneos.org |
@triskelion @comex It uses the same kernel.org LTS branches that are officially supported for each device, but we switch to using the latest GKI LTS revision from Greg KH which are based on the kernel.org LTS releases.
We could use the current 6.1 LTS everywhere in theory but we don't want to deviate so far from what's heavily tested and officially supported, so we stick to what's officially used which will get officially migrated to newer LTS branches now that devices have 7 years of support.
@comex They also had a bunch of clear sockpuppet personas. At least one of those personas was reused a bunch of times to advocate for including their patches and then to advocate for the project adding them as a maintainer. They had commits in other projects too.
They were contributing to other projects beyond xz from the Jia Tan persona and it's quite possible they did more from other personas.
We don't really know the extent of their attacks. They may have had past successes already.
@comex My main point is that if an attacker can get a backdoor into Debian unstable, they can almost certainly get it into Debian stable from there. Many Debian developers likely use Debian unstable on machines they use to develop Debian. It's not clear what the ultimate goal was of this attack but I would expect whoever is behind it took advantage of their backdoor being shipped even if it didn't reach their ultimate targets directly. They were playing the long game:
https://boehs.org/node/everything-i-know-about-the-xz-backdoor