SlideShare una empresa de Scribd logo
1 de 62
Free & Opensource Software and Security By  Buddhika Siddhisena CTO & CoFounder ThinkCube Systems Member of LKLUG
“ Opensource software lets anyone to look at the blue print source code”
“ What happens if these blue prints got into the  wrong hands ?”
Can you achieve security through Openess?
NSA
NSA = No Such Agency
NSA = National Security Agency
“ NSA is famous for keeping secrets, including their existence”
“ NSA releases SELinux, a security enhanced version of Linux as Opensource Software”
“ Hey wait a second !”
#1 org to keep secrets  releases their blueprints?
"Let me assure you that this action by the NSA was the crypto-equivalent of the Pope coming down off the balcony in Rome, working the crowd with a few loaves of bread and some fish, and then inviting everyone to come over to his place to watch the soccer game and have a few beers”  --Larry Loeb Source: http://www.ibm.com/developerworks/library/s-selinux/?n-s-381
So whats going on @ NSA?
Why did the most security conscious agency in the US do this?
"The Information Assurance Research Group of the NSA is responsible for carrying out the research and advanced development of technologies needed to enable NSA to provide the solutions, products, and services to achieve Information Assurance for information infrastructures  critical to U.S. National Security interests .” Source: http://www.nsa.gov/selinux/info/faq.cfm
critical to U.S. National Security interests
critical  to U.S. National Security interests
All computer software, whether Open Source or proprietary...
Has had bugs...
Currently has bugs...
And will continue to have bugs...
“ Given enough eye balls all bugs are shallow” - Eric S. Raymond
EnglishTranslation  : Given the fact that many people are constantly looking at the source code, and because anyone can improve it (by reporting or fixing bugs for eg.), it is less likely to contain many bugs.
“ So how secure is Linux?”
A four-year study released by Coverity, reports Linux has a low bug count, making the code more stable and secure. The 2.6 Linux production kernel, now being shipped with software from Novell and other Linux vendors, contains 985 bugs in 5.7 million lines of code, far below the industry average, said Seth Hallem, Coverity's CEO. Source: http://www.internetnews.com/dev-news/article.php/3448001
Commercial software contains 20 to 30 bugs for every thousand lines of code, according to Carnegie Mellon University's CyLab Sustainable Computing Consortium. That is the equivalent to 114,000 to 171,000 bugs in 5.7 million lines of code.
Opensource vs Proprietary 985 bugs vs 114,000+ bugs
Defect density declined by 2.2 percent as the total lines of code in the Linux kernel continues to grow from 5.76 million in December 2004 to 6.03 million in July 2005, which represents a 4.7 percent increase. "Although the size of the Linux kernel increased over the six-month study, we noticed a significant decrease in the number of potentially serious defects in the core Linux kernel," said Seth Hallem, CEO of Coverity, in a statement.
Free  & Opensoure software is transparent
“ Did you someone say Free?”
“ Free as in Freedom  not as in  Free Beer!”   - Richard M. Stallman
By using FOSS you have 4 types of freedom
Freedom 0 The freedom to run the program for any purpose
Freedom 1 The freedom to study how the program works and adopt it to your need
Freedom 2 The freedom to redistribute copies
Freedom 3 The freedom to improve the software and release the improvements to the world
Many Governments are adopting or have completely migrated to FOSS
Brazil Source: http://news.zdnet.co.uk/software/linuxunix/0,39020390,39196592,00.htm
Germany Source:
France Source: http://www.technewsworld.com/story/36886.html
China Source : http://news.zdnet.co.uk/software/linuxunix/0,39020390,39196592,00.htm
South Korea Source: http://news.com.com/2100-7344-5084811.html
To name a few...
but what about Sri Lanka?
Why are they adopting or migrating?
Its not always because of the lower price of acquiring FOSS
Its not always because of the lower Total Cost of Ownership (TCO) of using FOSS
Though they alone are good reasons!
Some Chinese officials are convinced that having an American government dominate the market compromises national security. Secret security flaws in Windows can be used to access Chinese networks. Officials like to state the discovery of the NSA key in Windows as proof that Microsoft is working with the US government on intelligence issues. Source: http://www.g4tv.com/screensavers/features/39528/China_The_Republic_of_Linux.html
“ Officials like to state the discovery of the NSA key in Windows as proof that Microsoft is working with the US government on intelligence issues?”
Conspiracy Theory? http://en.wikipedia.org/wiki/NSAKEY
Kraft points to an ongoing public battle between the Commonwealth of Massachusetts and Microsoft. The state is trying to pass legislation that would have the state adopt an open source document policy by January 2007 in order to better protect the accessibility of its digital documents. Source:http://searchopensource.techtarget.com/originalContent/0,289142,sid39_gci1180306,00.html
The state is arguing that if Microsoft or another closed source software vendor ceased to support older versions of its platforms, thousands of the state's archived documents could be rendered useless.
Imagine during an emergency or after a disaster, governmental organizations not being able to work effectively because they relied on a closed document format
And finally...
Why aren't there a lot of Linux viruses?
A computer virus, like a biological virus, must have a reproduction rate that exceeds its death (eradication) rate in order to spread. If the reproduction rate falls below the threshold necessary to replace the existing population, the virus is doomed from the beginning
The reason that we have not seen a real Linux virus epidemic in the wild is simply that none of the existing Linux viruses can thrive in the hostile environment that Linux provides. The Linux viruses that exist today are nothing more than technical curiosities; the reality is that there is no viable Linux virus. Source: http://librenix.com/?inode=21
And finally finally finally ...
True security comes NOT from  OBSCURITY
True security comes from TRANSPARENCY
~ the end

Más contenido relacionado

La actualidad más candente

La actualidad más candente (8)

Ratzan2
Ratzan2Ratzan2
Ratzan2
 
Ratzan2
Ratzan2Ratzan2
Ratzan2
 
Case study cybersecurity industry birth and growth
Case study cybersecurity industry birth and growth Case study cybersecurity industry birth and growth
Case study cybersecurity industry birth and growth
 
78751355 cryptomorphosis
78751355 cryptomorphosis78751355 cryptomorphosis
78751355 cryptomorphosis
 
Advantage Technology - Ransomware and the NIST Cybersecurity Framework
Advantage Technology - Ransomware and the NIST Cybersecurity FrameworkAdvantage Technology - Ransomware and the NIST Cybersecurity Framework
Advantage Technology - Ransomware and the NIST Cybersecurity Framework
 
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
 
Cybersecurity awesome mix vol. II
Cybersecurity awesome mix vol. IICybersecurity awesome mix vol. II
Cybersecurity awesome mix vol. II
 
Hackers are innocent
Hackers are innocentHackers are innocent
Hackers are innocent
 

Similar a FOSS and Security

DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptxDISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
mahendrarm2112
 
Week 6 cyberpolitics
Week 6 cyberpoliticsWeek 6 cyberpolitics
Week 6 cyberpolitics
oiwan
 
Os revolution reaction paper
Os revolution reaction paperOs revolution reaction paper
Os revolution reaction paper
Marklin
 

Similar a FOSS and Security (20)

GNU turns 30
GNU turns 30GNU turns 30
GNU turns 30
 
Should we floss in education
Should we floss in educationShould we floss in education
Should we floss in education
 
Should we floss in education
Should we floss in educationShould we floss in education
Should we floss in education
 
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptxDISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
 
Gup2011| open source
Gup2011| open sourceGup2011| open source
Gup2011| open source
 
Pak kiet presentation-24_mar_2005_7
Pak kiet presentation-24_mar_2005_7Pak kiet presentation-24_mar_2005_7
Pak kiet presentation-24_mar_2005_7
 
Free Software Movement and Open Source Communities
Free Software Movement and Open Source CommunitiesFree Software Movement and Open Source Communities
Free Software Movement and Open Source Communities
 
(In)security in Open Source
(In)security in Open Source(In)security in Open Source
(In)security in Open Source
 
Open Source Insight: Samba Vulnerability, Connected Car Risks, and Are You R...
Open Source Insight: Samba Vulnerability, Connected Car Risks,  and Are You R...Open Source Insight: Samba Vulnerability, Connected Car Risks,  and Are You R...
Open Source Insight: Samba Vulnerability, Connected Car Risks, and Are You R...
 
Linux presentation
Linux presentationLinux presentation
Linux presentation
 
Week 6 cyberpolitics
Week 6 cyberpoliticsWeek 6 cyberpolitics
Week 6 cyberpolitics
 
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
 
Introduction To Open Source
Introduction To Open SourceIntroduction To Open Source
Introduction To Open Source
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
Os revolution reaction paper
Os revolution reaction paperOs revolution reaction paper
Os revolution reaction paper
 
Hacking 09 2010
Hacking 09 2010Hacking 09 2010
Hacking 09 2010
 
Building your Open Source Security stack
Building your Open Source Security stackBuilding your Open Source Security stack
Building your Open Source Security stack
 
Open Source Insight: GDPR Best Practices, Struts RCE Vulns, SAST, DAST & Equ...
Open Source Insight:  GDPR Best Practices, Struts RCE Vulns, SAST, DAST & Equ...Open Source Insight:  GDPR Best Practices, Struts RCE Vulns, SAST, DAST & Equ...
Open Source Insight: GDPR Best Practices, Struts RCE Vulns, SAST, DAST & Equ...
 
Opensource
OpensourceOpensource
Opensource
 

Más de Bud Siddhisena

Más de Bud Siddhisena (20)

JIT qa-docker
JIT qa-dockerJIT qa-docker
JIT qa-docker
 
Building apis that don’t suck!
Building apis that don’t suck!Building apis that don’t suck!
Building apis that don’t suck!
 
Why should you android (archived)
Why should you android (archived)Why should you android (archived)
Why should you android (archived)
 
Virtualization, The future of computing (archived)
Virtualization, The future of computing (archived)Virtualization, The future of computing (archived)
Virtualization, The future of computing (archived)
 
Building the Next big thing (archived)
Building the Next big thing (archived)Building the Next big thing (archived)
Building the Next big thing (archived)
 
GNU/Linux for a better home (archived)
GNU/Linux for a better home (archived)GNU/Linux for a better home (archived)
GNU/Linux for a better home (archived)
 
Recipe of a linux Live CD (archived)
Recipe of a linux Live CD (archived)Recipe of a linux Live CD (archived)
Recipe of a linux Live CD (archived)
 
Gaming on linux (archived)
Gaming on linux (archived)Gaming on linux (archived)
Gaming on linux (archived)
 
FOSS in Sri Lanka (archived)
FOSS in Sri Lanka (archived)FOSS in Sri Lanka (archived)
FOSS in Sri Lanka (archived)
 
Contributing to FOSS (archived)
Contributing to FOSS (archived)Contributing to FOSS (archived)
Contributing to FOSS (archived)
 
Choosing your GNU/Linux distribution (archived)
Choosing your GNU/Linux distribution (archived)Choosing your GNU/Linux distribution (archived)
Choosing your GNU/Linux distribution (archived)
 
Beyond desktop/server with GNU/Linux (archived)
Beyond desktop/server with GNU/Linux (archived)Beyond desktop/server with GNU/Linux (archived)
Beyond desktop/server with GNU/Linux (archived)
 
UX talk
UX talkUX talk
UX talk
 
Opensource opportunity
Opensource opportunityOpensource opportunity
Opensource opportunity
 
Remembering steve
Remembering steveRemembering steve
Remembering steve
 
Scale Apache with Nginx
Scale Apache with NginxScale Apache with Nginx
Scale Apache with Nginx
 
Introduction to firewalls through Iptables
Introduction to firewalls through IptablesIntroduction to firewalls through Iptables
Introduction to firewalls through Iptables
 
Secure your IT infrastructure with GNU/Linux
Secure your IT infrastructure  with GNU/LinuxSecure your IT infrastructure  with GNU/Linux
Secure your IT infrastructure with GNU/Linux
 
Kernel Configuration and Compilation
Kernel Configuration and CompilationKernel Configuration and Compilation
Kernel Configuration and Compilation
 
Foss Gadgematics
Foss GadgematicsFoss Gadgematics
Foss Gadgematics
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

FOSS and Security

  • 1. Free & Opensource Software and Security By Buddhika Siddhisena CTO & CoFounder ThinkCube Systems Member of LKLUG
  • 2. “ Opensource software lets anyone to look at the blue print source code”
  • 3. “ What happens if these blue prints got into the wrong hands ?”
  • 4. Can you achieve security through Openess?
  • 5. NSA
  • 6. NSA = No Such Agency
  • 7. NSA = National Security Agency
  • 8. “ NSA is famous for keeping secrets, including their existence”
  • 9. “ NSA releases SELinux, a security enhanced version of Linux as Opensource Software”
  • 10. “ Hey wait a second !”
  • 11. #1 org to keep secrets releases their blueprints?
  • 12. "Let me assure you that this action by the NSA was the crypto-equivalent of the Pope coming down off the balcony in Rome, working the crowd with a few loaves of bread and some fish, and then inviting everyone to come over to his place to watch the soccer game and have a few beers” --Larry Loeb Source: http://www.ibm.com/developerworks/library/s-selinux/?n-s-381
  • 13. So whats going on @ NSA?
  • 14. Why did the most security conscious agency in the US do this?
  • 15. "The Information Assurance Research Group of the NSA is responsible for carrying out the research and advanced development of technologies needed to enable NSA to provide the solutions, products, and services to achieve Information Assurance for information infrastructures critical to U.S. National Security interests .” Source: http://www.nsa.gov/selinux/info/faq.cfm
  • 16. critical to U.S. National Security interests
  • 17. critical to U.S. National Security interests
  • 18. All computer software, whether Open Source or proprietary...
  • 21. And will continue to have bugs...
  • 22. “ Given enough eye balls all bugs are shallow” - Eric S. Raymond
  • 23. EnglishTranslation : Given the fact that many people are constantly looking at the source code, and because anyone can improve it (by reporting or fixing bugs for eg.), it is less likely to contain many bugs.
  • 24. “ So how secure is Linux?”
  • 25. A four-year study released by Coverity, reports Linux has a low bug count, making the code more stable and secure. The 2.6 Linux production kernel, now being shipped with software from Novell and other Linux vendors, contains 985 bugs in 5.7 million lines of code, far below the industry average, said Seth Hallem, Coverity's CEO. Source: http://www.internetnews.com/dev-news/article.php/3448001
  • 26. Commercial software contains 20 to 30 bugs for every thousand lines of code, according to Carnegie Mellon University's CyLab Sustainable Computing Consortium. That is the equivalent to 114,000 to 171,000 bugs in 5.7 million lines of code.
  • 27. Opensource vs Proprietary 985 bugs vs 114,000+ bugs
  • 28. Defect density declined by 2.2 percent as the total lines of code in the Linux kernel continues to grow from 5.76 million in December 2004 to 6.03 million in July 2005, which represents a 4.7 percent increase. "Although the size of the Linux kernel increased over the six-month study, we noticed a significant decrease in the number of potentially serious defects in the core Linux kernel," said Seth Hallem, CEO of Coverity, in a statement.
  • 29. Free & Opensoure software is transparent
  • 30. “ Did you someone say Free?”
  • 31. “ Free as in Freedom not as in Free Beer!” - Richard M. Stallman
  • 32. By using FOSS you have 4 types of freedom
  • 33. Freedom 0 The freedom to run the program for any purpose
  • 34. Freedom 1 The freedom to study how the program works and adopt it to your need
  • 35. Freedom 2 The freedom to redistribute copies
  • 36. Freedom 3 The freedom to improve the software and release the improvements to the world
  • 37. Many Governments are adopting or have completely migrated to FOSS
  • 41. China Source : http://news.zdnet.co.uk/software/linuxunix/0,39020390,39196592,00.htm
  • 42. South Korea Source: http://news.com.com/2100-7344-5084811.html
  • 43. To name a few...
  • 44. but what about Sri Lanka?
  • 45. Why are they adopting or migrating?
  • 46. Its not always because of the lower price of acquiring FOSS
  • 47. Its not always because of the lower Total Cost of Ownership (TCO) of using FOSS
  • 48. Though they alone are good reasons!
  • 49. Some Chinese officials are convinced that having an American government dominate the market compromises national security. Secret security flaws in Windows can be used to access Chinese networks. Officials like to state the discovery of the NSA key in Windows as proof that Microsoft is working with the US government on intelligence issues. Source: http://www.g4tv.com/screensavers/features/39528/China_The_Republic_of_Linux.html
  • 50. “ Officials like to state the discovery of the NSA key in Windows as proof that Microsoft is working with the US government on intelligence issues?”
  • 52. Kraft points to an ongoing public battle between the Commonwealth of Massachusetts and Microsoft. The state is trying to pass legislation that would have the state adopt an open source document policy by January 2007 in order to better protect the accessibility of its digital documents. Source:http://searchopensource.techtarget.com/originalContent/0,289142,sid39_gci1180306,00.html
  • 53. The state is arguing that if Microsoft or another closed source software vendor ceased to support older versions of its platforms, thousands of the state's archived documents could be rendered useless.
  • 54. Imagine during an emergency or after a disaster, governmental organizations not being able to work effectively because they relied on a closed document format
  • 56. Why aren't there a lot of Linux viruses?
  • 57. A computer virus, like a biological virus, must have a reproduction rate that exceeds its death (eradication) rate in order to spread. If the reproduction rate falls below the threshold necessary to replace the existing population, the virus is doomed from the beginning
  • 58. The reason that we have not seen a real Linux virus epidemic in the wild is simply that none of the existing Linux viruses can thrive in the hostile environment that Linux provides. The Linux viruses that exist today are nothing more than technical curiosities; the reality is that there is no viable Linux virus. Source: http://librenix.com/?inode=21
  • 59. And finally finally finally ...
  • 60. True security comes NOT from OBSCURITY
  • 61. True security comes from TRANSPARENCY