logoalt Hacker News

LamaOfRuintoday at 2:20 AM1 replyview on HN

That seems... not correct?

The comment was asking about preventing a compromised supplier for the developers.

A supply chain attack can be anywhere in the supply chain to the target. If I, the end user, am the target, then a supply chain attack compromising the developer of LittleSnitch is effective.

I may then be a conduit to compromising other software or components, and would both I and LittleSnitch would be part of the supply chain that could be attacked targeting them.


Replies

lapcattoday at 2:35 AM

> If I, the end user, am the target

You're not a target, anonymous rando.

show 1 reply