Logs show what the application is programmed to log.
Although there is a scenario where logs may show exceptions and their stacktraces, containing names of classes and methods. But that's no valuable information and usually says little to nothing to those not having access to the source code.
It is clear that the argument is desperate and meant to be deceptive.
And why the fuck should exposing the source code be a "security issue"? This is RIDICULOUS. Son, that fucking thing is supposed to work in a straight forward manner. It's a fucking simple piece of code. And yes, even exposing the source code is irrelevant - encrypted data won't be easier to crack because they operate on keys. You have to expect your source code to be easily hacked anyway, and operate under the assumption that your encryption takes years, decades or the total lifetime of our Sun to be cracked.
The simple answer is this:
Logs show what the application is programmed to log.
Although there is a scenario where logs may show exceptions and their stacktraces, containing names of classes and methods. But that's no valuable information and usually says little to nothing to those not having access to the source code.
It is clear that the argument is desperate and meant to be deceptive.
And why the fuck should exposing the source code be a "security issue"? This is RIDICULOUS. Son, that fucking thing is supposed to work in a straight forward manner. It's a fucking simple piece of code. And yes, even exposing the source code is irrelevant - encrypted data won't be easier to crack because they operate on keys. You have to expect your source code to be easily hacked anyway, and operate under the assumption that your encryption takes years, decades or the total lifetime of our Sun to be cracked.