Dosjdhdjdjdhdjdjdj (talk | contribs)
Tags: Mobile edit Mobile web edit
Dosjdhdjdjdhdjdjdj (talk | contribs)
Tags: Mobile edit Mobile web edit
Line 20: Line 20:
===SecuRam Backdoor===
===SecuRam Backdoor===
{{Main|SecuRam installs backdoor on ProLogic series safe locks}}
{{Main|SecuRam installs backdoor on ProLogic series safe locks}}
 
===Signal’s Refusal to Implement Australian Government Backdoor===
[[Signal]], an encrypted messenger, has threatened to leave Australia to due the Australian Government’s mandate to have access over the contents of Signal’s messages.<ref> https://ia.acs.org.au/article/2025/signal-threatens-to-leave-australia-over-govt-s-backdoor-push.html</ref><ref> https://www.vice.com/en/article/signal-app-australia-encryption-backdoor-bill/</ref>
===XZ Utils Backdoor===
===XZ Utils Backdoor===
The [[wikipedia:XZ_Utils_backdoor|XZ Utils backdoor]] was a code contribution to the XZ Utilities Linux system package that allowed remote code execution through a specific SSH key.<ref> https://gist.github.com/thesamesam/223949d5a074ebc3dce9ee78baad9e27</ref> This backdoor was significant as it went against the previously commonly held belief of open source software security through independent code auditing. The code contributor first had built trust with the maintainers by submitting legitimate code initially before implementing the backdoor in a subtle way through multiple layers to avoid suspicion. However this backdoor was discovered by Andres Freund.<ref> https://lwn.net/Articles/967180/</ref>
The [[wikipedia:XZ_Utils_backdoor|XZ Utils backdoor]] was a code contribution to the XZ Utilities Linux system package that allowed remote code execution through a specific SSH key.<ref> https://gist.github.com/thesamesam/223949d5a074ebc3dce9ee78baad9e27</ref> This backdoor was significant as it went against the previously commonly held belief of open source software security through independent code auditing. The code contributor first had built trust with the maintainers by submitting legitimate code initially before implementing the backdoor in a subtle way through multiple layers to avoid suspicion. However this backdoor was discovered by Andres Freund.<ref> https://lwn.net/Articles/967180/</ref>