Assessing the Y, and How, of the XZ Utils incident | Dark Hacker News