"The whole idea behind OpenBSD is that security is built right into the system and the code is audited for bugs, so there are still exploits that will work even with a fully patched and hardened system on (otherOS) but not on OpenBSD because of this."
So because OpenBSD is audited and has security built in ( as do all Unixes to one degree or another ) it means that all other systems can be exploited?
Or are you saying that OpenBSD cannot be broken into regardless of patch level ( not credible ) or are you saying that Linux does not undergo security reviews ( wrong ) or are you saying that no other OS has security built in ( wrong ) or are you saying that OS with ESMs are not as secure ( wrong )?
I've lost count of the number of security holes that have had to be patched with Apache that are security holes regardless of host OS ( including BSD ).
Any system is proportionally more vulnerable the more back level its security PATCHES (typo) are.
Nah, I think that OpenBSD, fearful of Linux popularity has decided to build up a wee bit of mythology around itself to help it survive. Encrypting swap aside ( as if you could really get to it ).
Plus, what idiot runs an out of the box non "hard" Linux distro?
From
http://www.developer.com/open/article.php/990711AIX
10 vulnerabilities[6 remote, 3 local, 1 both]
Debian GNU/Linux
13 vulnerabilities[1 remote, 12 local] + 1 Linux kernel vulnerability[1 local]
FreeBSD
24 vulnerabilities[12 remote, 9 local, 3 both]
HP-UX
25 vulnerabilities[12 remote, 12 local, 1 both]
Mandrake Linux
17 vulnerabilities[5 remote, 12 local] + 12 Linux kernel vulnerabilities[5 remote, 7 local]
OpenBSD
13 vulnerabilities[7 remote, 5 local, 1 both]
Red Hat Linux
28 vulnerabilities[5 remote, 22 local, 1 unknown] + 12 Linux kernel vulnerabilities[6 remote, 6 local]
Solaris
38 vulnerabilities[14 remote, 22 local, 2 both]