Posted on 01/20/2016 6:32:48 PM PST by Swordmaker
Obviously you have never worked in software development.
I develop daily. It’s complicated tying a lot of functionality together in a single entity. Exploiting one of these exploits hard! The code and who wrote it is all tracked. Most of these exploits are good intentioned code...with a blindspot.
The Linux kernel, as an example, has almost 20,000,000 lines of code and 14,000 authors, most of them volunteers. A lot of room there for exploits. Especially if the back door code or purposely flawed code is developed elsewhere (govt think tank) and designed to be stealthy. Wake up people.
Also, Tor, the so called underground internet, was funded, designed and developed by the U.S. government.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.