If the breached software is open source, there goes your weak link. Yea yea closed source get hacked too. But they damn sure ain’t providing would-be hackers the blueprint to their source code ecosystem.
With open source hackers know exactly where to penetrate. Closed source usually get hacked when an unscrupulous contractor leaves or finishes a project which, during his employment with the company, allowed him to be familiar with the environment. And if you’re a random hacker without that background, you just being a dumbass begging to get caught while you’re feeling your way through.
There are two sides to this argument. I’m curious to see in which camp the coli 6certs nikkas and wiggas (yes I said it
) will lump themselves in.