Just found that nice article in James’ Blog regarding security issues in combination with opened sources.
Quote: “Most people just downloaded the binaries and used them, but a lot of folks downloaded the sources, and many of them spent many hours trying to figure out how to break the security of the system. And several people did: they would publish their attacks, and we’d fix them.”
That’s how it works.
Please follow and like us: