{"id":7808,"date":"2013-10-10T19:18:01","date_gmt":"2013-10-10T17:18:01","guid":{"rendered":"https:\/\/owncloud.com\/?p=7808"},"modified":"2021-05-20T12:56:46","modified_gmt":"2021-05-20T12:56:46","slug":"ny-times-lets-build-a-more-secure-internet","status":"publish","type":"post","link":"https:\/\/owncloud.com\/de\/blogs\/ny-times-lets-build-a-more-secure-internet\/","title":{"rendered":"NY Times: Let\u2019s Build a More Secure Internet"},"content":{"rendered":"<p><!--:en--><strong>YES!<\/strong><\/p>\n<p>Finally, others are taking up the banner. A great op-ed piece in today\u2019s NY Times calling for an \u201copen hardware movement\u201d much like the open source software movement to help re-secure the internet.<\/p>\n<p>\u201cFortunately, there is something we can do: encourage the development of an \u201copen hardware\u201d movement \u2014 an extension of the open-source movement that has led to software products like the Mozilla browser and the Linux operating system.<\/p>\n<p>\u201cThe open-source movement champions an approach to product development in which there is universal access to a blueprint, as well as universal ability to modify and redistribute the blueprint. Wikipedia is perhaps the best-known example of a product inspired by the movement. Open-source advocates typically emphasize two kinds of freedom that their products afford: they are available free of charge, and they can be used and manipulated free of restrictions.<\/p>\n<p>\u201cBut there is a third kind of freedom inherent in open-source systems: the freedom to audit. With open-source software, independent security experts can scrutinize the code for vulnerabilities \u2014 whether accidentally or intentionally introduced. The more <a class=\"wpil_keyword_link \" href=\"https:\/\/owncloud.com\/features\/auditing\/\"  title=\"auditing\" data-wpil-keyword-link=\"linked\">auditing<\/a> by the programming masses, the better the security. As the open-source software advocate Eric S. Raymond has put it, \u201cgiven enough eyeballs, all bugs are shallow.\u201d<\/p>\n<p><strong>Yes, yes and YES.<\/strong><\/p>\n<p>As those of you who have followed me know, I have been calling on the tech industry itself to help fix the internet.<\/p>\n<p>Only with openness in both the hardware and the software can we get our internet back \u2013 we built it, we can fix it.<\/p>\n<p>The author concludes:<\/p>\n<p>\u201cBut never, of course, 100 percent secure. The N.S.A. could still try to exploit the Internet\u2019s open hardware. And of course, open hardware would do little to prevent the government from reading e-mail if it still had the cooperation of companies like Microsoft or Google. Open hardware is not a panacea.<\/p>\n<p>\u201cStill, open hardware would at a minimum make the N.S.A.\u2019s Internet surveillance efforts more difficult and less effective. And it would increase the difficulty of surveillance not just for the N.S.A. but also for foreign governments that might otherwise piggyback on N.S.A.-introduced security vulnerabilities.<\/p>\n<p>\u201cA 100 percent open-infrastructure Internet \u2014 a trustworthy Internet \u2014 would be an important step in the empowerment of individuals against their governments the world over.\u201d<\/p>\n<p><strong>It\u2019s a start.<\/strong><!--:--><!--:de--><!--:--><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A great op-ed piece in today\u2019s NY Times calling for an \u201copen hardware movement\u201d to help re-secure the internet.<\/p>\n","protected":false},"author":15,"featured_media":78665,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[48],"tags":[],"class_list":["post-7808","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"acf":[],"_links":{"self":[{"href":"https:\/\/owncloud.com\/de\/wp-json\/wp\/v2\/posts\/7808","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/owncloud.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/owncloud.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/owncloud.com\/de\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/owncloud.com\/de\/wp-json\/wp\/v2\/comments?post=7808"}],"version-history":[{"count":1,"href":"https:\/\/owncloud.com\/de\/wp-json\/wp\/v2\/posts\/7808\/revisions"}],"predecessor-version":[{"id":61443,"href":"https:\/\/owncloud.com\/de\/wp-json\/wp\/v2\/posts\/7808\/revisions\/61443"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/owncloud.com\/de\/wp-json\/wp\/v2\/media\/78665"}],"wp:attachment":[{"href":"https:\/\/owncloud.com\/de\/wp-json\/wp\/v2\/media?parent=7808"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/owncloud.com\/de\/wp-json\/wp\/v2\/categories?post=7808"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/owncloud.com\/de\/wp-json\/wp\/v2\/tags?post=7808"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}