(no title)
Soerensen | 26 days ago
What's concerning is the 6-month window. Supply chain attacks are difficult to detect because the malicious code runs with full user permissions from a "trusted" source. Most endpoint protection isn't designed to flag software from a legitimate publisher's update infrastructure.
For organizations, this argues for staged rollouts and network monitoring for unexpected outbound connections from common applications. For individuals, package managers with cryptographic verification at least add another barrier - though obviously not bulletproof either.
kijin|26 days ago
The crappy installation and update channels are often tightly integrated with the vendors' monetization strategies, so there's a huge amount of inertia.
Microsoft Store could have changed this situation, had it been better designed and better received. Unfortunately, nobody seems to use it unless they have no other choice.
WinGet looks much better, but so far it's only for developers and power users.
ziml77|26 days ago
I can't say it would have guaranteed people would have liked it, just that those were needed for it to have a chance.
pjc50|25 days ago
But then, in an environment dominated by corporate IT who have no real means of switching, why improve the product?
red_admiral|25 days ago
Don't you need to create a Microsoft account to use it? That makes sense for a store where you buy apps with money, but not for a package manager for free software like Notepad++.
P.S. I'm waiting for the day you need a registered Ubuntu account to use their snap store :(
themafia|26 days ago
What happened to just good old OS APIs? You could wrap the entire "secure update" process into a function call. Does Windows somehow not already have this?
xvilka|26 days ago
3371|24 days ago
kwanbix|25 days ago
NedF|26 days ago
[deleted]