open-source vs proprietary security software
Johan Wevers
johanw@vulcan.xs4all.nl
Sat Mar 17 12:09:00 2001
You, skribe, wrote:
>It's a question of numbers. The more eyes that see your code the greater
>the chance that you'll find the holes.
That is one thing, although it might not be perfect too (remember the false
positive gpg could give on multiple signatures).
The main reason is thrust. With closed-source solutions one can add
backdoors knowingly and have a reasonably chance of getting away with it for
some time. Lotus Notes and the products of Crypto AG are well-known examples
where this happened in practice. The discussions about the proposed NSA-key
in the windows signing system are another.
--
ir. J.C.A. Wevers // Physics and science fiction site:
johanw@vulcan.xs4all.nl // http://www.xs4all.nl/~johanw/index.html
PGP/GPG public keys at http://www.xs4all.nl/~johanw/pgpkeys.html