I don't understand why you are suggesting this only for open source
programs.  Were you thinking that an attacker would be incapable of
decompiling an executable and extracting the secret?

Reply via email to