Interference will happen whether the source is open or not (hackers
don't need access to the source), so it might as well be open so that
anyone can fix potential issues.
> --
> You received this message because you are subscribed to the Google Groups "Phantom Protocol" group.
> To post to this group, send email to phantom-...@googlegroups.com.
> To unsubscribe from this group, send email to phantom-protoc...@googlegroups.com.
> For more options, visit this group at http://groups.google.com/group/phantom-protocol?hl=en.
>
The theoretical security is a requirement of the protocol and it has
nothing to do with the implementation.
To read more about that topic see "security by obscurity".
Sent from Siri. Dictated not read.
Oops, I meant "unmaintained". It's definitely maintainable.
In the latter case, it can indeed be an arbitrarily manipulated version,
but as mentioned previously in this discussion, the exact same thing
goes for closed source products in that scenario too, so there is really
no difference (other than possibly the somewhat increased skill level
required for binary modification of a closed source program, but there
are quite simple ways to do that too).
What rather makes the open source alternative more secure is that anyone
who wants to can download the source, review it in any detail, and then
compile their own binary executable from it (i.e. if they don't trust
the binary version in the main repository to do what it says it does).
Regards,
Magnus
On 2012-03-08 22:45, Ben Giles wrote:
> There is a risk that the code can be subverted, but it is no less or greater than closed source.
>
> To read more about that topic see "security by obscurity".
>
>
>
> Sent from Siri. Dictated not read.
>
> On 08/03/2012, at 9:11 AM, "alan.tyrell" <alan.s...@gmail.com> wrote:
>
>> I am not trying to be negative here. I do believe there is a need for
>> a secure, adaptive and anonymous wave within the existing internet
>> fabric. And it must be free from any and all interference.
>>
>> A couple of thoughts�