On 2009-Aug-11 12:42:41 -0700, Harald Schilly <harald.schi...@gmail.com> wrote:
>My personal guess is that they want to be able to audit the software
>by looking at the source code. That's not possible if one of the
>components is or depends on binary code, where something could be
>hidden.

This is probably an opportune time to refer the readership to
"Reflections on Trusting Trust" by Ken Thompson.

-- 
Peter Jeremy

Attachment: pgpTtEEGiw6vw.pgp
Description: PGP signature

Reply via email to