How hard is it to implement a backdoor in a fully opensource project? (Assuming the project in question has a lot more eyes on it then an overworked developer)
I2P?
How hard is it to implement a backdoor in a fully opensource project? (Assuming the project in question has a lot more eyes on it then an overworked developer)