#opensourceprotection risultati di ricerca
Socket: ソフトウェア サプライ チェーン セキュリティ会社が 4,000 万ドルを調達 (シリーズ B) #SocketSecurity #OpenSourceProtection #SupplyChainDefense #InnovativeThreatDetection prompthub.info/60821/
The same thing is happening across the globe. “Open source” is just a scam used to get developers to give away IP and big players to white-label it without recognizing the developers.
Open source is not a moral halo and it is not a political promise. It is a licensing condition. It just means the source code is available to read, copy, modify, and redistribute under terms that meet the recognised criteria. The core of it is visibility plus permission, not…
Fair point—open-sourcing doesn't eliminate oversight, and modifications are inevitable. Key worries include bad actors creating deceptive or harmful versions (e.g., for misinformation or bias amplification) without traceability. Supervision could involve community audits or…
記事を読んでいただいてありがとうございます。 おっしゃる通りでして、民間企業や海外の政府組織では、OSPO(Open Source Program Office) というユニットがあり、ライセンスやセキュリティに関する管理を行っています。 参考: linuxfoundation.jp/wp-content/upl… 国連で、OSPOs for Good…
🛡️ Open Source is under threat: The @USPTO is proposing rule changes that could limit the community’s ability to defend against non-practicing entities. The Linux Foundation is responding, and we urge others to submit comments before 12/2/25. Read the full blog to learn more.…
This @OpenSourceOrg post from @tcarrez unpacks how #opensource underpins #digitalsovereignty, from regulatory enforcement to resilience in a fragmenting world. Worth a read for policymakers, technologists & those thinking about how we build trustworthy, future-proof digital infra
#OpenSource un bene comune globale per abilitare la sovranità digitale opensource.org/blog/open-sour…
Check out “Integrating Open Source Compliance in Your Internal Developer Platform” - buff.ly/XlafqA3 #DevOps #DevSecOps #OSPO
Years Old Bugs In Open Source Tool Left Every Major Cloud Open To Disruption - redpacketsecurity.com/years-old-bugs… #OSINT #ThreatIntel #CyberSecurity
Attackers are exploiting open-source registries as distribution hubs, enabling supply-chain compromises that target developer processes. This puts organizations at risk of widespread malware deployment and compromise of build and ship processes. Organizations must enhance…
ICYMI: We wrote some concrete npm security suggestions for JavaScript maintainers to help guard against Shai-Hulud style attacks. 👇 openjsf.org/blog/publishin…
If you trust the code you're operating on, yeah. The situation I want to protect against is a malicious repository that wants to steal the API token used by opencode for inference. I've been building a system where I can make disposable API tokens around an openai-compatible API…
from my fellow OSI board member @tcarrez "Open Source: A global commons to enable digital sovereignty" opensource.org/blog/open-sour…
Exactly. And this is the drawback but also advantage of open-source. It allows malicious actors to do attacks like this but once the flaws are discovered it can and will make the code more secure than any private code would ever be.
For the record: I highly disagree with everyone who's calling for authorities. Cardano is supposed to be secure. The code is supposed to be the law. If the code is flawed & you can do a transaction like this, then we (the Delegators + SPOs) are the ones responsible. Not the…
Opensource is irrevokable. WebGPU comes along, tries to replace WebGL, claims to be the upgrade path from WebGL. Also adds DRM and remote control thru https cert revoke. We are protected by the irrevokable nature of opensource. competing product cant deprecate an existing product
That's regulatory capture. A process that becomes onerous or preventative for competition, raising the barrier for entry. The point of OpenSource is its copyleft rights, anyone can take or modify it. By placing a regulatory barrier there you effectively kill it.
Earlier today, Nyimbi Odero highlighted the advantages of open-source tools using Signal as an example noting that their transparency & publicly verifiable code offer better security & protection than closed-source alternatives. #EASF | #APSA | #Cybersecurity | #CyberTerrorism
Nyimbi Odero emphasized the superior value of open-source tools, citing Signal as an example,explaining that their inherent transparency & verifiable code provide stronger security & protection compared to closed-source platforms. #EASF | #APSA | #Cybersecurity | #CyberTerrorism
#APSA | ##CyberTerrorism Through plenary presentations, interactive discussions & experience-sharing sessions,the program is designed to promote knowledge exchange,deliver practical #CyberSecurity insights & facilitate collaborative learning in order to achieve these objectives:
Something went wrong.
Something went wrong.
United States Trends
- 1. #StrangerThings5 278K posts
- 2. Thanksgiving 708K posts
- 3. BYERS 65.3K posts
- 4. robin 100K posts
- 5. Afghan 310K posts
- 6. Dustin 78K posts
- 7. Reed Sheppard 6,599 posts
- 8. Holly 68K posts
- 9. Vecna 64.8K posts
- 10. Jonathan 76.1K posts
- 11. Podz 5,002 posts
- 12. hopper 16.8K posts
- 13. Erica 19K posts
- 14. Nancy 70.1K posts
- 15. Lucas 85.1K posts
- 16. noah schnapp 9,309 posts
- 17. Joyce 34.3K posts
- 18. mike wheeler 10.2K posts
- 19. National Guard 686K posts
- 20. Tini 10.4K posts