this post was submitted on 08 Dec 2025
14 points (100.0% liked)

Asklemmy

51678 readers
390 users here now

A loosely moderated place to ask open-ended questions

Search asklemmy ๐Ÿ”

If your post meets the following criteria, it's welcome here!

  1. Open-ended question
  2. Not offensive: at this point, we do not have the bandwidth to moderate overtly political discussions. Assume best intent and be excellent to each other.
  3. Not regarding using or support for Lemmy: context, see the list of support communities and tools for finding communities below
  4. Not ad nauseam inducing: please make sure it is a question that would be new to most members
  5. An actual topic of discussion

Looking for support?

Looking for a community?

~Icon~ ~by~ ~@Double_A@discuss.tchncs.de~

founded 6 years ago
MODERATORS
 

Without going through the whole source code. You can just look up the information on the web, but how do you know whether to trust that information?

(Assuming no security audit has been listed on the website, or the audit seems outdated.)

you are viewing a single comment's thread
view the rest of the comments
[โ€“] communism@lemmy.ml 5 points 1 week ago

I mean someone pointing out a vulnerability in a piece of software should be a falsifiable claim, e.g. "they store their passwords in plaintext"โ€”if it's foss then just look at the source. You don't need to read the entire source because you have been given a specific part of the code to look at. You need to only look at the process between the software receiving a password and its query to the database.

And if it's not foss I don't use it, and the claim may be unfalsifiable for an outsider who isn't bothered to try reverse engineering.