> On Apr 6, 2024, at 6:07 AM, Les Schaffer <[email protected]> wrote:
> 
> What's your take on Tim Bray's suggestion?
> 
> https://www.tbray.org/ongoing/When/202x/2024/04/01/OSQI

I think it's worth reading and affects everybody using a computer although most 
won't read it.  Heartbleed probably affected everyone on this list, and the 
OpenSSl flaw that permitted it is still operational in tens of thousands of web 
servers a decade later.  There are a few things I would add to the article.

1. We should assume that the some US intelligence agency found flaws in some 
widely-used open source software (OSS) packages or tools that others have not, 
and the NSA are exploiting the flaws it finds.  I think the US NSA has OSS 
"bugged," or activists should assume that's the case because the NSA has had 
the tech industry thoroughly bugged for decades (viz., Snowden's revelations; I 
actually worked with a person whose name popped up on one of Snowden's docs; at 
the time, those of us at the particular company suspected as much and joked 
about whether or not a spook gets to draw two salaries).  The NSA won't shut 
down hospitals with software exploits, unless it really needs to, but it also 
won't reveal bugs to those who can fix them, or at least activists should 
assume that.

2. I don't think Tim Bray has a security background, but the first question I 
have is the size of the "attack surface" through which people can implant or 
exploit bugs in OSS.  We cannot count how many lines of source code are in open 
source libraries, the genome project has 300 billion, and ChatGPT put the 
estimate as high as trillions of lines of code.  The same is true for the 
number of software packages that hold those lines of code.  Chatgpt thought 
that 2 million packages represented a small fraction of the total.

3. Nothing was said about AI, but it seems unlikely that a single institute 
would accomplish much of the work of finding problems in even the most widely 
used OSS packages.  Perhaps they would write software tools for companies to do 
the work on the OSS that they use in their products.  That's an expense that 
the sales and marketing-oriented leadership of US companies have demonstrated 
in the past that they are most likely to forgo.  We don't need AI to find a 
buffer-overflow bug like Heartbleed, but people will need to use a lot of 
automation to find this problem.  I am actually impressed that he did not drag 
out the AI buzzword in the essay, but I think they may need the technology.

It will be hard to secure open-source software in our national-security state 
so long as powerful adversaries with the deep pockets of the US government are 
intent upon exploiting bugs and no doubt planting them (as Bernstein and others 
said the NSA does with standards cryptographic algorithms).  Maybe Bray could 
get further in Canada or find an ally in the EU.

Thanks for sending it.

Mark 

-=-=-=-=-=-=-=-=-=-=-=-
Groups.io Links: You receive all messages sent to this group.
View/Reply Online (#29816): https://groups.io/g/marxmail/message/29816
Mute This Topic: https://groups.io/mt/105362381/21656
-=-=-
POSTING RULES & NOTES
#1 YOU MUST clip all extraneous text when replying to a message.
#2 This mail-list, like most, is publicly & permanently archived.
#3 Subscribe and post under an alias if #2 is a concern.
#4 Do not exceed five posts a day.
-=-=-
Group Owner: [email protected]
Unsubscribe: https://groups.io/g/marxmail/leave/8674936/21656/1316126222/xyzzy 
[[email protected]]
-=-=-=-=-=-=-=-=-=-=-=-


Reply via email to