On the critical path to implant backdoors and the effectiveness of potential mitigation techniques: Early learnings from XZ

Publication
arXiv