wow, it might? so it follows that it might not.
after they release the white paper, there might be enough details to discuss. then again, maybe not.
wow, it might? so it follows that it might not.
after they release the white paper, there might be enough details to discuss. then again, maybe not.
It's intuitively obvious. Open source for a hacker / terrorist is analogous to having the blueprints for Fort Knox, the US attack plan for Iraq, or the schematics on how our missile targeting systems work. Yes, as someone posted above, it can be decompiled and deduced. But that's a pretty tedious and difficult process. You can also deduce our missile targeting systems with adequate access and time.