<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[@downey@floss.social @relay@relay]]></title><description><![CDATA[<span><a href="/user/downey%40floss.social">@downey@floss.social</a></span> <span><a href="/user/relay%40relay.infosec.exchange">@relay@relay.infosec.exchange</a></span> As much as I wish this were true, it’s not. Obscurity is a valid security layer and open source software with exposed source code _does_ make it easier for attackers to find attack vectors.<br /><br />Without access to source code an attacker has to infer vulnerabilities by hitting the code. Those recon hits are visible in security tools like SIEMs.<br /><br />Open source vulnerabilities can be discovered directly from the source and the attacker can craft the perfect exploit without ever touching production code. Then hit it once very effectively, probably escaping detection because there’s no recon signals.<br /><br />The days of <a href="https://foostang.xyz?t=oss" rel="tag">#OSS</a> being used for actual critical applications is drawing to a close.<br /><br /><a href="https://foostang.xyz?t=infosec" rel="tag">#infosec</a><br />]]></description><link>https://board.circlewithadot.net/topic/71f7f00b-9bd2-4c0b-8ba2-2bc2ecec1a19/@downey@floss.social-@relay@relay</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 01:45:47 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/71f7f00b-9bd2-4c0b-8ba2-2bc2ecec1a19.rss" rel="self" type="application/rss+xml"/><pubDate>Wed, 15 Apr 2026 16:07:51 GMT</pubDate><ttl>60</ttl></channel></rss>