For the 100th and million time I am going to explain computer science, slowly, so even moron's can grasp the basics! Have you ever used Open Source?
Those of us that have have always been paranoid about and suspected back-door's, after all why would anyone just give a system - to everybody else for
Nothing in life is free... is Windows, Apple or Google Free?
That goes for advertising and telephone line's too...
The GNU is not Unix, X-Windows has been the bane of many a programmer, simply because of it's coding style rendering, making it non-Unicode
As far as the governments are concerned, attacking mathematics is stupid!
Programmers make no apology for good Math's!
There's good math's and then there's bad maths, just like there are good standards and then there are bad ones.
When it comes to bugs, well you really should read the "Unix Haters Handbook"
The original programmers abandoned "Multics" and time-sharing systems like Unix age's ago...
At the heart of Google is Ken Thompson known in hacker circles as Ken winning a Turing award for Computer Science.
The snow-den leaks where significant, because it highlighted where companies like Android and TrapX want to go with thing's like the your desktop. The
Amazon echo thing- also trending on here is not news, echo is Android.
So bug's in Android Smart TV's and Killer Android Cars not news, Snowden told us this # already...
As to back-door's you mean in programming parlance; Trap Door - A computer trapdoor, also known as a back door, provides a secret -- or at least
undocumented -- method of gaining access to an application, operating system or on-line service. Programmers write trapdoors into programs for a
variety of reasons.
There are already Tap0 interface's written into OpenBSD, Linux (Android) MS-Windows and no I will not explain how they work, because if you don't know
why those are there then you didn't read that Open Source license agreement carefully enough.
We trust you have received the usual lecture from the local System
Administrator. It usually boils down to these three things:
#1) Respect the privacy of others.
#2) Think before you type.
#3) With great power comes great responsibility.
The argument about cryptography is simple, our math, as it stands - is #!
If you want to edit encryption, there are easy ways to do it and the added benefit of having written it yourself, that's the difference. Programmers
are not restricted by understanding that a i386 x86 chip can not perform the same encryption as a 64bit and encryption systems that have already been
written can be re-written on the fly.
You do not have to wait for someone else to make a source revision, to edit Open Source!
An least we forget, there are a lot of Encryption finalist's to choose from for Phase 1, 2, 3 & Finally 4.
So there's still a lot of work to be done on that front.
Algorithms like Scream & Dragon or Phelix & Ice.
edit on 13-3-2017 by phicoder because: tidy