• theunknownmuncher@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    21 days ago

    Addressing logical fallacies elevates the discussion to place where it can actually be productive, not lowers it.

    In multiple replies you failed to even attempt to address the elephant in the room; that you have zero fucking clue how to verify that applications delivered from a repo aren’t malicious.

    It’s not relevant because it applies to both random websites and code repositories equally. Again, please quote me where I claimed that code repositories are not susceptible to this.

    Ad hominem is a problem now when you started accusing me of lacking reading comprehension aka stupidity and then ignorance

    You’ve demonstrated both of these, so it is just statement of fact. “you moron” this you?

      • theunknownmuncher@lemmy.world
        link
        fedilink
        arrow-up
        0
        ·
        edit-2
        21 days ago

        All of the flaws that come with supply chain attacks on repos also apply to random websites, plus even more flaws that repositories are not as susceptible to or do not apply to repos at all.

        Doesn’t change that this ^ is a fact you can’t refute, so I’m correct. Your entire argument is strawman arguing against claims that I’ve never made and name calling. You’re basically just arguing with yourself. 🤷