Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1750739AbWEPUaS (ORCPT ); Tue, 16 May 2006 16:30:18 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1750731AbWEPUaS (ORCPT ); Tue, 16 May 2006 16:30:18 -0400 Received: from main.gmane.org ([80.91.229.2]:5571 "EHLO ciao.gmane.org") by vger.kernel.org with ESMTP id S1750728AbWEPUaR (ORCPT ); Tue, 16 May 2006 16:30:17 -0400 X-Injected-Via-Gmane: http://gmane.org/ To: linux-kernel@vger.kernel.org From: =?iso-8859-1?Q?M=E5ns_Rullg=E5rd?= Subject: Re: Wiretapping Linux? Date: Tue, 16 May 2006 21:29:59 +0100 Message-ID: References: <4469D296.8060908@perkel.com> Mime-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Transfer-Encoding: 8bit X-Complaints-To: usenet@sea.gmane.org X-Gmane-NNTP-Posting-Host: agrajag.inprovide.com User-Agent: Gnus/5.1007 (Gnus v5.10.7) XEmacs/21.4.15 (Security Through Obscurity, linux) Cancel-Lock: sha1:NpRZgGzlTGBmtEMn/L+h3hYXvlA= Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 770 Lines: 14 Chase Venters writes: > The thing is that there is enough peer review in the open source world > that not only would it be *difficult* to slip in some intentionally > malicious code (and I don't think any malicious code of much potential > would be likely to make it past LKML, especially if it doesn't closely > adhere to CodingStyle :P) but it would not be long before someone > noticed it. Some details on a real attempt: http://kerneltrap.org/node/1584 -- M?ns Rullg?rd mru@inprovide.com - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/