The xz exploit pushed the limits of social engineering, code obfuscation, package distribution and more. I'm concerned the important parts aren't being covered, so I decided to do a vid
FOLLOW LOW LEVEL: @LowLevelLearning
This blog post carried the video:
[ Ссылка ]
Follow Rob as well: [ Ссылка ]
Maintainer's blog post: [ Ссылка ]
Diagram: [ Ссылка ]
S/O Ph4se0n3 for the awesome edit 🙏
![](https://i.ytimg.com/vi/0pT-dWpmwhA/maxresdefault.jpg)