“security by obscurity” a fairy tale

Just found that nice article in James’ Blog regarding security issues in combination with opened sources.

Quote: “Most people just downloaded the binaries and used them, but a lot of folks downloaded the sources, and many of them spent many hours trying to figure out how to break the security of the system. And several people did: they would publish their attacks, and we’d fix them.”

That’s how it works.

Please follow and like us:

Leave a Reply

Your email address will not be published. Required fields are marked *