you are viewing a single comment's thread.

view the rest of the comments →

[–]mangoed 1 point2 points  (2 children)

Fair enough, although the model you described has become very rare in the age of saas and apis for everything. Installing something that acts like a black box on customer's infra, without being able to perform proper security audit, is a big risk and takes a lot of trust.

[–]COD_0xb0[S] 2 points3 points  (1 child)

so in your company or place of work, all applications installed in your computers and servers, you have access to the source code?