Hmm, having the source code allows for "white-box" vulnerability analysis of said code, I know security by obscurity(compiled code in this case) is just a delay tactic, not true security, but this brings a whole new level of concern with it. What if they find something we missed; weaponized exploits for vulnerabilities in F-16 weapons systems = VeryBad™ IMHO.
__________________
"Crime is an extension of business through illegal means, politics is an extension of crime through *legal* means."
|