

Perhaps I’m too skeptical and/or have trust issues, but isn’t this too little too late? This issue had been ignored for so long, but -suddenly- within 24 hours of this very peculiar find[1], Ventoys maintainer goes into full damage-control mode. Should we just accept that?
Sorry, at least for now, I simply don’t buy it.
Spoiler alert: Ventoy’s sister software -called iVentoy- employs a trick that has been utilized for installing compromised kernel drivers. ↩︎
Fam, you’ve chosen to trust them for reasons that are unclear to me. Honestly, I don’t see anything (yet) that would clear their name. For all we know, they could have ties to some intelligence agency; which the infamous Jia Tan has (retroactively) been accused of as well.
That’s not the issue. I’ve also made plenty use of it in the past. But at what point do you start to second guess the intent behind the maintainer?
Again, arguably too little too late. They literally ghosted the issue for over a year. Then, within 24 hours of possible proof of malicious code, they appear and (perhaps) “pose the image” of putting in a gargantuan effort to resolve the issue. But, like, where were they for a year? Furthermore, the hints of justifications for their actions are simply not up too par.
Don’t get me wrong. As I clearly hinted at it in my previous comment, if they pull through and provide/produce (bit-by-bit) reproducible builds of Ventoy[1], then I obviously have no qualms against them or their software. Why would I? But until then, I will steer clear.
What should have happened for you to be more concerned?
Another spoiler-alert: They admitted that it would be hard. Which is fine, but could be interpreted as the first action for an eventual cop out. Only time will tell… ↩︎