this post was submitted on 04 Feb 2022
15 points (82.6% liked)
Security
5142 readers
1 users here now
Confidentiality Integrity Availability
founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
While the article provides good description of fuzzing, static analysis etc it focuses only on a set of threats and mitigations. There is much more:
I agree that claiming that something is secure just because it's FLOSS is an oversimplification. Security is a much bigger and broader process than just analyzing a binary or some sources.
You make a lot of good points here, many of which I actually agree with.
The article focused on studying the behavior and properties of software. For completeness, it mentioned how patching can be crowdsourced with the example of Calibre. I also described how FLOSS decreases dependence on a vendor, and wrote two prior posts about this linked at the top.
I never claimed that source code is useless, only that we shouldn't assume the worst if it isn't provided.