Conversation

What community? Not aware of any community doing anything substantial in that regard. It's not a real thing, and if it was, they could fully review closed source libraries to the same extent and doing it with the same extreme care/depth is not substantially harder at that point.
2
> People review the Linux kernel Who reviews Linux kernel in anything but a very shallow and targeted way? > I won't ever give up my right to review and for others to review what they can. You have a right to inspect / review closed source software too.
2
And I don't really see what stops inspecting / reviewing in with the same care / depth. It's not even obfuscated in any way. If you took the alternate approach of getting official access to the sources, you give up your right to publish them, obviously not to review them.
1
But regardless, you're not really reviewing / auditing code, and there is not a community of people doing it. If there was, they wouldn't be blocked by only having compiled, unobfuscated libraries in some cases. As you're well aware there aren't even people interested in building
2
The Linux kernel is far beyond doing any kind of serious auditing / review, and there are not people even attempting to do that across it. Even Linus lacks a grasp of it as a whole. Chromium or any other functional browser engine is the same situation. What do you plan to ship?
1
Chromium has more code that's actually used than the Android userspace and it takes more time to build. How are you going to review that? And the Linux kernel? You're going to get 400 developers to take 10 years to fully review Linux 4.14? And then what? What does it accomplish?
1
1
You seem to be more concerned about theoretical backdoors than very real and tangible vulnerabilities making those backdoors completely useless even if they do exist. Why would anyone even need to insert backdoors into these kinds of technologies? I don't get it, sorry.
1
1
Show replies
Yeah, and so does Linux, or Chromium. You certainly can't use an ARM SoC which is actually largely a black box (unlike a closed source library where you have all the unobfuscated, simply compiled code, and could review it in the that form, which may even be better for your goal).
1
1
Show replies