Joseph Daniel Schmidt, a former US Army sergeant, pleaded guilty to attempting to sell classified data to the Chinese government after using his top-secret security clearance to retain sensitive information post-military service. Schmidt's methods were described as uninformed, often using his personal email for communication. Meanwhile, critical vulnerabilities were reported in the libxml2 XML parsing library, primarily affecting its Schematron elements, highlighting the challenges of maintaining legacy code amid modern security demands.
"Schmidt's tradecraft was amateurish as he sent emails to the Chinese government from email addresses registered in his name and used Google to search for topics such as countries that don't extradite suspects to the USA."
"Such legacy code can't be maintained indefinitely," Wellnhofer noted, referring to vulnerabilities in the libxml2 library and advocating for the removal of Schematron support to address the extensiveness of issues.
Collection
[
|
...
]