• 2 Posts
  • 13 Comments
Joined 3 days ago
cake
Cake day: August 10th, 2025

help-circle
  • Beastie Boys had one of the first and biggest of the anti-Iraq-War songs, I can’t think offhand of one that was more “mainstream” at the time and still explicit and specific about it.

    Well I’ll be sleeping on your speeches 'til I start to snore
    Cause I won’t carry guns for an oil war
    As-Salamu alaikum, wa alaikum as-salam
    Peace to the Middle East peace to Islam

    And so on. It might not have been the best (IMO that is “Empire” by Dar Williams, with haunting sadness, historical scope, and irony), but it was big.










  • I sort of have a suspicion that there is some mathematical proof that, as soon as it becomes quick and easy to import an arbitrary number of dependencies into your project along with their dependencies, the size of the average project’s dependencies starts to follow an exponential growth curve increasing every year, without limit.

    I notice that this stuff didn’t happen with package managers + autoconf/automake. It was only once it became super-trivial to do from the programmer side, that the growth curve started. I’ve literally had trivial projects pull in thousands of dependencies recursively, because it’s easier to do that than to take literally one hour implementing a little modified-file watcher function or something.



  • I feel like this is kind of the amateur-hour stuff. It’s certainly dangerous, but in comparison to a lot of state-actor activities (or even committed-amateur activities), this kind of supply-chain attack is pretty blatant and easy to spot. Which doesn’t mean it’s easy to spot – I just mean would be trivial to volunteer and contribute some minimal fixes and enhancements to some open source project, and then at one point smuggle in a zero-day that will basically never be detected unless someone detects the intrusion itself and then works backwards from there with a ton of time to spend on it.

    If you’ve ever looked at the obfuscated C contest it should be obvious that this kind of thing can be made completely invisible if you know what you’re doing. Some of the interactions and language features that lead to problems are basically impossible for a casual viewer to see, even if they’re paying attention, and the attack surface is massive and the amount of attention that goes into checking it for weird subtle vulnerabilities is minuscule.