Thank you for bringing this to my attention. I’m the author of the article and I’ve contacted my editor at Linux.com to find out what she wants to do with this piece.
This issue brings up something that hits very close to home for me. As I review a LOT of Linux distributions, I have to wonder if something like this is going to become more prevalent. If that’s the case, what do we do? Are there specific tools people like me (tech writers…not developers) can use to ensure a distribution is safe from such malicious behaviors?
Thank you again for bringing this to my attention. And than you for any input you might have.
Have a wonderful day.