Hardly an equivalent demonstration to the absolute core original source code of your personal information.
It is a valid demonstration. And as further proof that your claim is without legs, here's all the details required to acquire the data:
According to your argument, since I spelled out the entirety of my security systems (including which version I used), and since the bad guys can readily acquire and review the inner workings of everything I used, they should be able to crack this data posthaste.
My demonstration utilized absolutely NO "security through obscurity." Everything I used is Open Source, so there is NO "security through obscurity" in play.
So, like it or not, your house-of-cards argument on the risks of open source has crashed to the ground under the weight of these facts. Even you have essentially admitted that the data is secure.
Sure, you can continue arguing otherwise...but such conduct on your part would be (as you are wont to say) disingenuous. In fact, such would prove to be intellectually dishonest on your part...in the extreme.
-Jay
Again your arguments are completely disingenuous, which is the only way you know how to argue. Too bad you can never win an argument with a knowledgeable debator that way.