Posts

Toward a critical phenomenology of closed source security