So I'd like to address some of the earlier posts.
First off, to those that felt it necessary to make puerile comments about me, ad hominem attacks weaken your premise. I understand it's hard to see the wood for the trees, but honestly, get over yourselves. You aren't beyond reproach (far from it), and all of you clearly lack the humility and wherewithal to know what you don't know. Shooting the messenger doesn't make you right, it just makes you ignorant. Stating that you are ignorant is not "FUD", it's a statement of fact, but the good news is that ignorance is a state you can escape from.
Now, it's important to understand why this "spork" nonsense is so fundamentally broken. I've seen arguments centred around the "many-eyes" principle of FOSS, and some based on deterministic builds (which is an idiotic argument, and completely misses the point, so I won't be addressing it).
I know that for many of you this is your first open-source project, and your first exposure to the development of security software of any kind, and so you may be unfamiliar with thinking adversarially. You may think that merely because a handful of others glance at the code that it magically makes it secure, but that is not the case. Open-source software i just at risk as closed-source software, except that you're not paying known entities to review the code. Neither approach is a magic bullet.
So how could a backdoor be hidden in the code? If you've ever seen the
International Obfuscated C Code Contest you'll know that it is reasonably trivial to make code nearly impossible to read and grok. But have you ever heard of the
Underhanded C Contest? If you're familiar with C then I encourage you to take a look at some of the past entries.
The long and the short of it is that it is not unheard of, or particularly difficult, for an obfuscated back door to be slipped into open-source code. But hey - this is a risk in Bitcoin and Monero and other cryptocurrencies, so Dash is fine, right??? Well...for currencies besides Dash the risk is somewhat reduced by the fact that the effects of such a backdoor can immediately be observed, whereas with Dash the "spork" model means that an exploit can be hidden away and only activated at a later stage, or the network can be remotely forked by anyone who holds the spork key.
My conversation with dEBRUYNE was neither secret (it was in a public channel) nor was it incorrect. If you can't understand the implications of what I said then it would behove you to discuss it with me, rather than insulting me.