this post was submitted on 08 Dec 2025
14 points (100.0% liked)

Asklemmy

51663 readers
430 users here now

A loosely moderated place to ask open-ended questions

Search asklemmy 🔍

If your post meets the following criteria, it's welcome here!

  1. Open-ended question
  2. Not offensive: at this point, we do not have the bandwidth to moderate overtly political discussions. Assume best intent and be excellent to each other.
  3. Not regarding using or support for Lemmy: context, see the list of support communities and tools for finding communities below
  4. Not ad nauseam inducing: please make sure it is a question that would be new to most members
  5. An actual topic of discussion

Looking for support?

Looking for a community?

~Icon~ ~by~ ~@Double_A@discuss.tchncs.de~

founded 6 years ago
MODERATORS
 

Without going through the whole source code. You can just look up the information on the web, but how do you know whether to trust that information?

(Assuming no security audit has been listed on the website, or the audit seems outdated.)

top 6 comments
sorted by: hot top controversial new old
[–] j4k3@piefed.world 10 points 1 week ago (1 children)

The easiest way is to always use a DNS whitelist firewall on a external device on your network. It is a pain in the ass to manage that list, but you'll log and block every unexpected connection.

Otherwise, you can do a basic grep for "http" in the source, or even by scanning a binary for strings. This vector is easily mitigated by an attacker using encryption or a simple cypher, but it will catch a lot of script kiddies.

[–] wabasso@lemmy.ca 3 points 1 week ago

(Not OP) I didn’t think there would be such a powerful simple answer to this, but that’s a great idea. Thanks!

[–] communism@lemmy.ml 5 points 1 week ago

I mean someone pointing out a vulnerability in a piece of software should be a falsifiable claim, e.g. "they store their passwords in plaintext"—if it's foss then just look at the source. You don't need to read the entire source because you have been given a specific part of the code to look at. You need to only look at the process between the software receiving a password and its query to the database.

And if it's not foss I don't use it, and the claim may be unfalsifiable for an outsider who isn't bothered to try reverse engineering.

[–] pinball_wizard@lemmy.zip 5 points 1 week ago* (last edited 1 week ago)

You can just look up the information on the web, but how do you know whether to trust that information?

With open source, it's easy to get caught lying, or even just pushing on the boundaries of good ethics (cough Ubuntu cough).

If it's controversial, it is possible to verify the claims.

[–] lemuria@lemmy.ml 1 points 1 week ago

~~we either put it in virustotal, spin up a VM, and run the thing without network access, and just hope for the best~~

[–] ganymede@lemmy.ml 1 points 1 week ago* (last edited 1 week ago)

but how do you know whether to trust that information

test it, break it, see what happens.