On 02/15/2011 09:29 AM, C F wrote:

"Security through obscurity" does not work with open source software.


What a bold statement, are you telling me it works with closed source
software? :P

Depends on your definition of 'works' I guess :-)

With closed source software, it takes rather longer to figure out a way around the obscuring mechanism(s), but if enough people are interested in doing so, they will. With open source software, pretty much anyone can get around such mechanisms in a short period of time.

--
Kevin P. Fleming
Digium, Inc. | Director of Software Technologies
445 Jan Davis Drive NW - Huntsville, AL 35806 - USA
skype: kpfleming | jabber: kflem...@digium.com
Check us out at www.digium.com & www.asterisk.org

--
_____________________________________________________________________
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
              http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
  http://lists.digium.com/mailman/listinfo/asterisk-users

Reply via email to