| ▲ | m-schuetz 2 hours ago | |
Binaries or source, it's pretty much the same unless you thoroughly vet the entire source code. Malicious code isn't advertised and commented and found by looking at a couple of functions. It's carefully hidden and obfuscated. | ||
| ▲ | g-b-r an hour ago | parent [-] | |
That's However much the code is hidden and obfuscated, some parts of the source code are going to be looked upon. For a binary, none, ever, except in the extremely rare case that someone disassembles and analyzes one version of it. The fact that open-source doesn't coincide with security doesn't mean that it isn't beneficial to security. | ||