He's a huge international criminal wanted by the FBI and Interpol. Trust me, you're reading it here on the internet, so, it must be true, right?
I trust no code downloaded from the internet -- unless things are signed with gpg keys and there is a chain of trust from me to the person who posted the code, or if it is on a site with a trusted certificate of an organization I consider reputable. Lacking those, I want to at least be able to read the source code.
And, in no way is this indented to besmirch anyone -- especially not as a new member of a forum -- and certainly not trying to insult a respected member of the said forum.
Since you can always flash the original firmware back on your scope, what are you worried about?
to be honest, I had not even considered rolling back. Good point.
Even if he was a notorious ransomware bitcoin criminal, what's the worst that happens? you flash your old firmware back on the box and you're none the worse for wear.
Really? It seems a motivation to perform this seems to be to enable features in the scope that were not enabled out of the box -- including features that cannot be enabled through the licence mechanism of the scope GUI. Clearly these persist after rolling back to the old firmware. For example, all 4 channel scopes use the same OS image, regardless of whether they are 100 or 200 MHz instruments. Loading the modified version, or rolling it back does not impact whether it is a 100 or 200 MHz instrument -- there are other steps that need be done that do persist. Same is true for the installed licences.
If something were to corrupt things in this persistent storage, for whatever reason, rolling back the OS will not fix things. What else is in that storage? Calibration factors? Serial numbers? FPGA Firmware?
sheesh.
Edit:
But, I probably will use the ADS files that they had published. I think the risk is low to modest; certainly if I accept the assertion that these script does nothing but open a root port on 10101 that is transient.