Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

That has not been my experience. Sure, you don't have any control over the third-party stuff but I haven't seen this issue being widespread in the mainstream third-party libraries I've used e.g. logback, jackson, junit, jedis, pgJDBC etc which are very well known/widely used. The only place I've actually seen proliferation of this was by a contractor, who I suspect, was trying to ensure job security behind impenetrability.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: