Discussion in 'all things UNIX' started by vasa1, Sep 1, 2011.
Could be much worse, but thankfully not.
I would hope there is a redundant copy not accessible via the internet to maintain purity.
The source control, GIT used for Linux kernel dev is resilient to tampering as every change that is committed a hash is generated. It would be easy to verify the changes against each hash. Each hash depends on a previous hash. If any current or historic code was manipulated in the source data store, a hash verification would show it up.
Separate names with a comma.