2.5 Admins

2.5 Admins 292: Trivyally Infected

28 snips
Mar 26, 2026
Discussion of a controversial US rule forcing consumer routers to be made in America and why origin does not equal security. Deep dive into a Trivy supply-chain compromise and how CI/CD tools become high-value targets. Examination of geo-targeted malware behavior suggesting state motives. Practical talk on filesystem safety inside VMs, ZFS crash consistency, and journaling advice.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

Made In USA Rule Misses Security Point

  • The US router ban focuses on physical manufacture, not software provenance, which makes it ineffective for security.
  • Allan Jude argues firmware/source audits would be more meaningful than forcing assembly in the US.
ADVICE

Run OPNsense On X86 If You Need Trust

  • Use open router OSs like OPNsense on x86 hardware if you can't trust consumer kit or need control.
  • Jim Salter points out assembling on generic x86 lets you avoid dubious vendor firmware while keeping routing features.
INSIGHT

Router Compromise Yields Limited Value

  • Compromising a router gives metadata like DNS and IP patterns but not HTTPS content, limiting value.
  • Jim Salter explains most traffic is encrypted and websites already leak richer tracking data than a router compromise would.
Get the Snipd Podcast app to discover more snips from this episode
Get the app