Ad hoc auditing is just like reverse engineering. You can’t really do it to any scale. Of course, very good white hat hackers can penetration test anything through reverse engineering, but we don’t want to make that the entry barrier toward making any publicly useful software.

Keyboard shortcuts

j previous speech k next speech