(⬤ᴥ⬤)@lemmy.blahaj.zone to 196@lemmy.blahaj.zone · 2 years agoSingle point of failrulelemmy.blahaj.zoneimagemessage-square52linkfedilinkarrow-up1822arrow-down10
arrow-up1822arrow-down1imageSingle point of failrulelemmy.blahaj.zone(⬤ᴥ⬤)@lemmy.blahaj.zone to 196@lemmy.blahaj.zone · 2 years agomessage-square52linkfedilink
minus-squareTootSweet@lemmy.worldlinkfedilinkEnglisharrow-up8·2 years agoIf the security of your algorithm depends on the algorithm itself being secret, then it’s not safe to distribute the software only in binary form either.
If the security of your algorithm depends on the algorithm itself being secret, then it’s not safe to distribute the software only in binary form either.