Data Protection and Security |
||||||
VI |
Operating System Security and Secure Programming |
|||||
VI.IV |
Secure Software Development |
|||||
On Open Source and Closed Source: Software which have intellectual property to protect or cryptographic key to remain private should use a mechanism to keep secrets in code. Probably the most popular way to keep secrets in code is to hide the source and release only an executable version in machine code (Security by obscurity). QUESTION: What is the problem here? Code obfuscation is the general idea of transforming the code in such a way that it becomes more difficult for the attacker to read and understand. Though code obfuscation raises the bar significantly, closed source is no panacea for software security. Fallacies that go beyond confusion over the many-eyeballs phenomenon are given in the book Building Secure Software by John Viega, Gary McGraw, Addison-Wesley, 2001, as follows. Please consult this reference for more details about this discussion. Microsoft Fallacy:
Java Fallacy: If we keep fixing the holes in a given piece of software, eventually the software will be completely secure. |
||||||
VI.IV.II Q |
[+] Question
[-] Question
: Is this “Many-Eyeballs Phenomenon” Real? |
|||||
|
||||||
|
chapter index | |||||