What is the opinion of security software distributed as binaries?
It seems that binaries can be stuffed full of doors, holes, worms, viruses,
and compromised crypto, without the user ever knowing. Except for
experiencing the result. Binaries are distributed in the 'trust it blindly,
it's safe' concept.
Totally fictitious situation follows:
Assume that one could prove that a security software company was compromised
by association with a group that was strongly motivated to monitor
communications. Let's say use American examples here, Clipper chip, Key escrow
Bill Stout (Systems Engineer/Consultant) stoutb @
Pioneer Standard (Computer Systems & Components) http://www.pios.com/
San Jose, CA (Location of 1 of 52 U.S. offices) (408) 954-9100
*My opinions do not reflect that of the company, and visa-versa, thankfully.*