(⬤ᴥ⬤)@lemmy.blahaj.zone to 196@lemmy.blahaj.zone · 4 months agoSingle point of failrulemessage-squaremessage-square52fedilinkarrow-up1825arrow-down10
arrow-up1825arrow-down1message-squareSingle point of failrule(⬤ᴥ⬤)@lemmy.blahaj.zone to 196@lemmy.blahaj.zone · 4 months agomessage-square52fedilink
minus-squareTootSweet@lemmy.worldlinkfedilinkEnglisharrow-up8·4 months agoIf the security of your algorithm depends on the algorithm itself being secret, then it’s not safe to distribute the software only in binary form either.
If the security of your algorithm depends on the algorithm itself being secret, then it’s not safe to distribute the software only in binary form either.