> However with open source it is more than likely - even perhaps inevitable > - that that code *is* going to be scrutinised by people with the technical > know-how to notice certain weaknesses or deliberate circumventions or > backdoors. The same certainly cannot be said of closed source software > especially when such security issues may well be part of
Not true. For instance, PGP had bug in open source for more than two years, a very serious one. Then there are very few who actually build executables from inspected sources (which still contain bugs.) For instance, sendmail worm compiled into downloadable executable last year. The only way to benefit from openness is to use it and verify yourself, instead of delluding yourself that someone out there will spend days doing that for ... what ? ===== end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __________________________________________________ Do you Yahoo!? Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com # distributed via <nettime>: no commercial use without permission # <nettime> is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: [EMAIL PROTECTED] and "info nettime-l" in the msg body # archive: http://www.nettime.org contact: [EMAIL PROTECTED]