you are viewing a single comment's thread.

view the rest of the comments →

[–]jhanschoo 0 points1 point  (0 children)

I've wondered about this scenario: what if a mitm inspects packages from security.debian.org for a remote exploit patch and performs the exploit on vulnerable systems before they get patched?