On 2009-Aug-11 12:42:41 -0700, Harald Schilly <harald.schi...@gmail.com> wrote: >My personal guess is that they want to be able to audit the software >by looking at the source code. That's not possible if one of the >components is or depends on binary code, where something could be >hidden.
This is probably an opportune time to refer the readership to "Reflections on Trusting Trust" by Ken Thompson. -- Peter Jeremy
pgpTtEEGiw6vw.pgp
Description: PGP signature