Lux on Nostr: Possibly, but that's a thought I've had before with FOSS. How long would it take for ...
Possibly, but that's a thought I've had before with FOSS. How long would it take for a threat actor or vuln to be found? How many other people think "surely someone else is auditing the code, right?" And doesn't check for themselves. Trust, but verify.