tabular, 2 months ago (edited 2 months ago) How do you qualify the security of a closed source code when you can’t verify it?
How do you qualify the security of a closed source code when you can’t verify it?