Actually I don't think the military benefits from closed source, they already use hardware devices for key management to anything sensitive, and they really shouldn't be using anything that can be hacked without the keys anyways.

Reply to this note

Please Login to reply.

Discussion

No replies yet.