View Single Post
Old 10-31-2011, 12:51   #2
BOfH
Guerrilla Chief
 
Join Date: Jun 2011
Location: NYC Area
Posts: 828
Hmm, having the source code allows for "white-box" vulnerability analysis of said code, I know security by obscurity(compiled code in this case) is just a delay tactic, not true security, but this brings a whole new level of concern with it. What if they find something we missed; weaponized exploits for vulnerabilities in F-16 weapons systems = VeryBad™ IMHO.
__________________
"Crime is an extension of business through illegal means, politics is an extension of crime through *legal* means."
BOfH is offline   Reply With Quote