[23:50] <teward> probably the stupidest thing to ask but are there any copies of the exploited binaries for xz still available? Want to detonate the payload safely in a research lab and examine the results to see what else this "backdoor" does other than intercept auths
[23:50] <teward> only asking as a security research perspective