

2·
12 hours agoBy this logic, can we trust any open source software, even if they claim to use some third party encryption? They could say they’re using a super secure encryption, even show it implemented in their open source code base, then just put the other, secret evil backdoor code base in production? Is there a way for any open source project to prove that the code in their open source repo is the code in production?
In the end i have to choose between some shady company or some guy with a homelab. I guess I’ll choose the one who isn’t financially incentivized to screw me over.