So, we've all accepted the "many eyes" theory of open source, and we assume that those eyes find many defects and fix them, hence increasing security. But, inside of many very important security sectors (especially in the U.S.) - that line of reasoning is said not to work. To paraphrase a few words from the linked article at the end of this post:
"Allowing people to review source code for even a minute is dangerous"
https://www.reuters.com/article/us-...e-widely-used-by-u-s-government-idUSKBN1FE1DT
I don't think the U.S. military has ever released source code just to increase its security. When is open source more secure, and under what conditions?
What does the FreeBSD forum community think about this? I know this has been hashed and rehashed many times here on the forum, but have we ever constructed a simple, one or two sentence statement that could be the definitive answer for this question? Is it that the source (the blueprint) allows an attacker to target areas and find a single defect, making it inappropriate for zero-tolerance situations, but that same blueprint enhances overall the number of fixed defects, making reviewable source a better option in all situations except for zero tolerance ones? Perhaps I've answered my own question, but maybe some other forum members could provide their own all-in-one answers.
If my explanation suits you, then you'll agree that any software source used inside of secure apps (especially certain govt quarters) - should NEVER be given to (potential) adversaries. That seems to eliminate Unix and Linux for use in these quarters, and (I would think) - antivirus software with exposed source.
"Allowing people to review source code for even a minute is dangerous"
https://www.reuters.com/article/us-...e-widely-used-by-u-s-government-idUSKBN1FE1DT
I don't think the U.S. military has ever released source code just to increase its security. When is open source more secure, and under what conditions?
What does the FreeBSD forum community think about this? I know this has been hashed and rehashed many times here on the forum, but have we ever constructed a simple, one or two sentence statement that could be the definitive answer for this question? Is it that the source (the blueprint) allows an attacker to target areas and find a single defect, making it inappropriate for zero-tolerance situations, but that same blueprint enhances overall the number of fixed defects, making reviewable source a better option in all situations except for zero tolerance ones? Perhaps I've answered my own question, but maybe some other forum members could provide their own all-in-one answers.
If my explanation suits you, then you'll agree that any software source used inside of secure apps (especially certain govt quarters) - should NEVER be given to (potential) adversaries. That seems to eliminate Unix and Linux for use in these quarters, and (I would think) - antivirus software with exposed source.