
Supply Chain Security - Part 1 - JSJ 524
JavaScript Jabber
00:00
How to Define Trustworthy Authors
You can also take the approach that apple and microsop take, which is ecause we also have to define what scope you're trying to solve for. But even trustworthy authors can turn not trustworthy, like the attack we sawoh, absolutely with merrick a sabbath. Heis own taod. And also, maintainers can lose their passwords, and can get hacked. Their machines can get compromised. O, i'll just quickly summarize it for charles. So there was a maintainer that basically went rogue. The amazon e w s a lie tool was affected by this,. because if you installed it, you would get the latest version of th visguis library
Transcript
Play full episode