(⬤ᴥ⬤) to [email protected] • 5 months agoSingle point of failrulelemmy.blahaj.zoneimagemessage-square52fedilinkarrow-up1815arrow-down10cross-posted to: microblogmemes
arrow-up1815arrow-down1imageSingle point of failrulelemmy.blahaj.zone(⬤ᴥ⬤) to [email protected] • 5 months agomessage-square52fedilinkcross-posted to: microblogmemes
minus-square@TootSweetlinkEnglish8•5 months agoIf the security of your algorithm depends on the algorithm itself being secret, then it’s not safe to distribute the software only in binary form either.
If the security of your algorithm depends on the algorithm itself being secret, then it’s not safe to distribute the software only in binary form either.