Comment Re:Thank God.... (Score 0) 265
the problem is that exploiting linux doesn't require breaking a complex lock, since you can view the source code you just have to look through and find the weak spot. So it is less enjoyable for hacker, there is a certain joy we receive in making an electronic device bend to our will after hours of coding.