@[email protected] to [email protected]English • edit-21 month agoActually, Winamp is not going Open Sourceprogramming.devimagemessage-square99arrow-up1667arrow-down110file-text
arrow-up1657arrow-down1imageActually, Winamp is not going Open Sourceprogramming.dev@[email protected] to [email protected]English • edit-21 month agomessage-square99file-text
minus-square@[email protected]linkfedilinkEnglish21•1 month agoI look at ‘source available’ software as the right to review the code yourself to ensure there’s no malicious behavior, not for community development.
minus-square@[email protected]linkfedilinkEnglish5•1 month agoYou mean if you build it yourself? I guess that is something, but it is still conceivable to sneak stuff in. Look at that xzlib backdoor from a few weeks ago.
minus-square@[email protected]linkfedilinkEnglish1•1 month agoIs there any way to verify that the product in deployment is built from the same source? I’m guessing hash values but I still think it can be faked.
I look at ‘source available’ software as the right to review the code yourself to ensure there’s no malicious behavior, not for community development.
You mean if you build it yourself? I guess that is something, but it is still conceivable to sneak stuff in. Look at that xzlib backdoor from a few weeks ago.
Is there any way to verify that the product in deployment is built from the same source? I’m guessing hash values but I still think it can be faked.