Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: steve-b
Yes; that's why you check the source code. :-)

You actually expect anyone --including my Mom -- who uses NSA Linux to read the source code for vulnerabilities?
48 posted on 06/28/2002 12:32:53 PM PDT by Bush2000
[ Post Reply | Private Reply | To 47 | View Replies ]


To: Bush2000
You actually expect anyone --including my Mom -- who uses NSA Linux to read the source code for vulnerabilities?

If you will not check the source code for Mom, there are plenty of other eyes on the 'net that can and will.

If Mom is running "closed source", your only choice is to keep your prying eyes to yourself. This requires that you have blind faith in those that produced the proprietary code which is controlling Mom's machine.

It's not terribly difficult to grasp which code base is more likely to be trusted.

50 posted on 06/29/2002 8:13:55 AM PDT by InfraRed
[ Post Reply | Private Reply | To 48 | View Replies ]

To: Bush2000
anyone --including my Mom -- who uses NSA Linux

Your own mom uses Linux? ;-)
Well, somebody will review the code, and if Mom reads either the tech press or Slashdot, (heh-heh) she'll hear about it.

51 posted on 06/29/2002 8:14:47 AM PDT by TechJunkYard
[ Post Reply | Private Reply | To 48 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson