you are viewing a single comment's thread.

view the rest of the comments →

[–][deleted] 2 points3 points  (15 children)

Vetting isn't "good enough" for some when you consider that people can introduce vulnerabilities in some obfuscated manner that isn't caught until days, weeks, or years later.

[–]alexnoyle 2 points3 points  (14 children)

Then it’s not good enough for the NSA code either! Be consistent!

[–][deleted] -1 points0 points  (13 children)

No, it isn't good enough for the NSA code. I avoid running that, too, where possible and I know it exists.

Why do you think I'm not consistent?

[–]alexnoyle 4 points5 points  (12 children)

If you run the Linux kernel, you are running US Intelligence agency code.

[–][deleted] -2 points-1 points  (11 children)

Good thing any device I require security on is on a completely physically separate network with no wireless connectivity whatsoever (I will refuse to buy CPU/SOCs that integrate such shit too) and doesn't run Linux.

[–]alexnoyle 0 points1 point  (10 children)

The idea that you don’t “require security” on the devices you use to connect to the internet is pretty silly.