Page 2 of 2 FirstFirst 12
Results 41 to 57 of 57

Thread: Open Source and Security

  1. #41
    PowerPoster PlausiblyDamp's Avatar
    Join Date
    Dec 2016
    Location
    Pontypool, Wales
    Posts
    2,852

    Re: Open Source and Security

    I can certainly see that there might be a lot of those types looking at the code, but they will not be the only ones.

    A lot of commercial software uses open source encryption libs these days, so there will be a considerable number of professional cryptography experts looking at and maintaining them as well. Also, finding and fixing flaws in these libraries is a good way for people to get recognition in this very specialised area - so there are selfish reasons for people to do the "right thing" as well as people just wanting to fix problems.

    Most standard encryption libraries are heavily used and effectively battle tested, problems are not likely to remain hidden for long. Proprietary ones on the other hand could definitely have hidden flaws that are never publicly spotted or fixed.

  2. #42
    Super Moderator FunkyDexter's Avatar
    Join Date
    Apr 2005
    Location
    An obscure body in the SK system. The inhabitants call it Earth
    Posts
    7,935

    Re: Open Source and Security

    I guess it comes down to which you think is more likely:-
    1. that a good actor finds a flaw and fixes it (or reports it and gets it fixed)
    2. that a bad actor finds a flaw and exploits it

    I would say that the chances are roughly equal but option 2 also needs to rely on option 1 to fail. For the bad actor to succeed requires that no good actor spot the exploit and that probably diminishes as the overall volume of actors increases. If any good actor spots the exploit then the bad actor fails. On that basis an Open Source with a massive number of participants is likely to be secure, I think, though it would be an interesting puzzle to game out.

    Personally, my indifference to Open Source comes from bad experiences trying to integrate OS elements into commercial products. I found they tended to be poorly documented, often with multiple different branches whose purposes were opaque and often updating to get a desired change introduced a whole bunch of other unexpected and undesirable changes. None of those things are intrinsic to the Open Source model but I did find them prevalent. I think what happens is that everyone wants to get involved in the fun bit: code; but nobody wants to do the boring but necessary stuff: admin, documentation and management. Whenever I found myself struggling the failure wasn't in the principle, it always seemed to be in the human element.

    Which neatly dovetails into:-
    the environments these things are used in
    Yeah, that. I don't think there's anything intrinsically wrong with Signal as a platform. But it hadn't been approved (in fact, advice had been issued not to use it), they used it on unsecure devices, they used it in unsecure locations and they didn't follow any sort of protocol to secure the group. This is the equivalent of posting your banking password on Social Media and then blaming the bank when your money disappears. We all know that, in security, it's the human element that is the weakest link.




    I'm going to pre-empt Shaggy's inevitable pun about the overall volume of actors and just say: Brian Blessed.
    The best argument against democracy is a five minute conversation with the average voter - Winston Churchill

    Hadoop actually sounds more like the way they greet each other in Yorkshire - Inferrd

  3. #43
    Angel of Code Niya's Avatar
    Join Date
    Nov 2011
    Posts
    8,790

    Re: Open Source and Security

    The Politico is funded to produce liberal propaganda. No one with a lick of sense should be reading that trash except to be aware of the garbage narratives being pushed in the present.

    I wouldn't be angry about anything I read there if I were you. That article has nothing to do with the viability of open-source applications where security is paramount. All that article is designed to do is undermind the Trump administration, nothing more. If the exact same thing happened under Kamala Harris or Joe Biden, that article would have taken a completely opposite position.
    Treeview with NodeAdded/NodesRemoved events | BlinkLabel control | Calculate Permutations | Object Enums | ComboBox with centered items | .Net Internals article(not mine) | Wizard Control | Understanding Multi-Threading | Simple file compression | Demon Arena

    Copy/move files using Windows Shell | I'm not wanted

    C++ programmers will dismiss you as a cretinous simpleton for your inability to keep track of pointers chained 6 levels deep and Java programmers will pillory you for buying into the evils of Microsoft. Meanwhile C# programmers will get paid just a little bit more than you for writing exactly the same code and VB6 programmers will continue to whitter on about "footprints". - FunkyDexter

    There's just no reason to use garbage like InputBox. - jmcilhinney

    The threads I start are Niya and Olaf free zones. No arguing about the benefits of VB6 over .NET here please. Happiness must reign. - yereverluvinuncleber

  4. #44
    PowerPoster PlausiblyDamp's Avatar
    Join Date
    Dec 2016
    Location
    Pontypool, Wales
    Posts
    2,852

    Re: Open Source and Security

    Quote Originally Posted by FunkyDexter View Post
    Personally, my indifference to Open Source comes from bad experiences trying to integrate OS elements into commercial products. I found they tended to be poorly documented, often with multiple different branches whose purposes were opaque and often updating to get a desired change introduced a whole bunch of other unexpected and undesirable changes. None of those things are intrinsic to the Open Source model but I did find them prevalent. I think what happens is that everyone wants to get involved in the fun bit: code; but nobody wants to do the boring but necessary stuff: admin, documentation and management. Whenever I found myself struggling the failure wasn't in the principle, it always seemed to be in the human element.
    I think that sums up the issue with open source quite nicely - depending on the project in question it can be a massive help or a major pain. Well supported and widely used projects can work really well, however far too often open source projects are written to fill an individual need; if your problem isn't perfectly aligned then integrating them can be more trouble than it is worth.

    Cryptography however needs to be open IMHO, without lots of visibility and proper testing (and cryptography testing is a whole other level of testing) then how can anyone have faith in a propriety method?

    Quote Originally Posted by FunkyDexter View Post
    Which neatly dovetails into:-

    Yeah, that. I don't think there's anything intrinsically wrong with Signal as a platform. But it hadn't been approved (in fact, advice had been issued not to use it), they used it on unsecure devices, they used it in unsecure locations and they didn't follow any sort of protocol to secure the group. This is the equivalent of posting your banking password on Social Media and then blaming the bank when your money disappears. We all know that, in security, it's the human element that is the weakest link.
    The Signal protocol is a very heavily used and tested protocol, it has become almost a de-facto standard, the chances of severe security flaws are pretty slim. The issue is using unapproved software for the type of communication, on unsecured devices, on possibly unsecure networks, and inviting the wrong person in to the chat

  5. #45
    PowerPoster PlausiblyDamp's Avatar
    Join Date
    Dec 2016
    Location
    Pontypool, Wales
    Posts
    2,852

    Re: Open Source and Security

    Quote Originally Posted by Niya View Post
    The Politico is funded to produce liberal propaganda. No one with a lick of sense should be reading that trash except to be aware of the garbage narratives being pushed in the present.

    I wouldn't be angry about anything I read there if I were you. That article has nothing to do with the viability of open-source applications where security is paramount. All that article is designed to do is undermind the Trump administration, nothing more. If the exact same thing happened under Kamala Harris or Joe Biden, that article would have taken a completely opposite position.
    https://mediabiasfactcheck.com/politico/ I am assuming anything that isn't Twitter is assumed to be far left propaganda...

  6. #46
    PowerPoster dilettante's Avatar
    Join Date
    Feb 2006
    Posts
    24,480

    Re: Open Source and Security

    Ask a crook about the reputation of a crook?

  7. #47
    PowerPoster PlausiblyDamp's Avatar
    Join Date
    Dec 2016
    Location
    Pontypool, Wales
    Posts
    2,852

    Re: Open Source and Security

    Quote Originally Posted by dilettante View Post
    Ask a crook about the reputation of a crook?
    So I should ask Trump?

  8. #48
    Angel of Code Niya's Avatar
    Join Date
    Nov 2011
    Posts
    8,790

    Re: Open Source and Security

    Quote Originally Posted by dilettante View Post
    Ask a crook about the reputation of a crook?
    It's worse than that. Imagine wanting to be told what colour the sky is instead of wanting to see for yourself.
    Treeview with NodeAdded/NodesRemoved events | BlinkLabel control | Calculate Permutations | Object Enums | ComboBox with centered items | .Net Internals article(not mine) | Wizard Control | Understanding Multi-Threading | Simple file compression | Demon Arena

    Copy/move files using Windows Shell | I'm not wanted

    C++ programmers will dismiss you as a cretinous simpleton for your inability to keep track of pointers chained 6 levels deep and Java programmers will pillory you for buying into the evils of Microsoft. Meanwhile C# programmers will get paid just a little bit more than you for writing exactly the same code and VB6 programmers will continue to whitter on about "footprints". - FunkyDexter

    There's just no reason to use garbage like InputBox. - jmcilhinney

    The threads I start are Niya and Olaf free zones. No arguing about the benefits of VB6 over .NET here please. Happiness must reign. - yereverluvinuncleber

  9. #49
    PowerPoster wqweto's Avatar
    Join Date
    May 2011
    Location
    Sofia, Bulgaria
    Posts
    5,833

    Re: Open Source and Security

    Quote Originally Posted by PlausiblyDamp View Post
    The Signal protocol is a very heavily used and tested protocol, it has become almost a de-facto standard, the chances of severe security flaws are pretty slim. The issue is using unapproved software for the type of communication, on unsecured devices, on possibly unsecure networks, and inviting the wrong person in to the chat
    Btw, internet is unsecure network. Signal protocol is designed to be secure over unsecure networks. The signal protocol security is scutinized and accepted by cryptographers to be one of the best in class for messenger applications.

    Unsecure devices and human stupidity are unsurmountable problems though.

    cheers,
    </wqw>

  10. #50
    PowerPoster PlausiblyDamp's Avatar
    Join Date
    Dec 2016
    Location
    Pontypool, Wales
    Posts
    2,852

    Re: Open Source and Security

    Quote Originally Posted by wqweto View Post
    Btw, internet is unsecure network. Signal protocol is designed to be secure over unsecure networks. The signal protocol security is scutinized and accepted by cryptographers to be one of the best in class for messenger applications.

    Unsecure devices and human stupidity are unsurmountable problems though.

    cheers,
    </wqw>
    Completely agree with you, if you are using a typical messenger application then the Signal protocol is about as good as it gets. WhatsApp, Google rcs, some Facebook messenger, and some Skype messages use it.

    Signal, or open source, isn't the issue here and attempting to blame (unfounded) short comings in an application that should never have been used in this situation is trying to deflect blame from all of the people involved.

  11. #51
    Super Moderator dday9's Avatar
    Join Date
    Mar 2011
    Location
    South Louisiana
    Posts
    12,084

    Re: Open Source and Security

    Quote Originally Posted by wqweto View Post
    Unsecure devices and human stupidity are unsurmountable problems though.
    I've heard someone here (Shaggy maybe) call users meatbags (just double checked, it was Shaggy) and I've taken that approach in programming ever since.

    Basically, I try to program to the lowest common denominator and make it as idiot proof as possible. Even then, I'm still constantly surprised at how easily users can break stuff.

    In short:
    Name:  blame-the-user.jpg
Views: 75
Size:  59.0 KB
    "Code is like humor. When you have to explain it, it is bad." - Cory House
    VbLessons | Code Tags | Sword of Fury - Jameram

  12. #52
    Super Moderator Shaggy Hiker's Avatar
    Join Date
    Aug 2002
    Location
    Idaho
    Posts
    39,801

    Re: Open Source and Security

    Quote Originally Posted by Niya View Post
    It's worse than that. Imagine wanting to be told what colour the sky is instead of wanting to see for yourself.
    How do you propose that we do that, in this case?

    It's a significant issue, these days. Ultimately, you simply don't have enough time in your life to "see for yourself" in all cases. You MUST take some things as they stand. You don't have to put much faith in them, but if you decide that anything that you haven't seen for yourself must be fake...you've got problems.
    My usual boring signature: Nothing

  13. #53
    Super Moderator Shaggy Hiker's Avatar
    Join Date
    Aug 2002
    Location
    Idaho
    Posts
    39,801

    Re: Open Source and Security

    Quote Originally Posted by dday9 View Post
    I've heard someone here (Shaggy maybe) call users meatbags (just double checked, it was Shaggy) and I've taken that approach in programming ever since.

    Basically, I try to program to the lowest common denominator and make it as idiot proof as possible. Even then, I'm still constantly surprised at how easily users can break stuff.
    I didn't originate that, though I don't remember where I saw it. I learned it almost thirty years ago. I wrote a program that I was able to test in a leisurely fashion over a fair amount of time...though I'd also have to say that in retrospect, I wasn't GOOD at testing software, but I didn't know that at the time. I deployed it at work...and somebody managed to crash it in about two seconds. In that two seconds, they had just been pressing buttons at random. There were very few buttons, but they didn't take the time to read the word or two of text on the ones they pressed. The bottom line was that my well tested program had crashed almost immediately, and through random usage.

    Once I got looking at it, I realized that there was a sequence of buttons that COULD be pressed, but which I had assumed that nobody would ever press because it would be irrational if the user read the button captions. They did not, and happened to hit on the irrational sequence. That taught me that people will try, not just the reasonable things, but ANYTHING.
    My usual boring signature: Nothing

  14. #54
    PowerPoster
    Join Date
    Sep 2005
    Location
    Modesto, Ca.
    Posts
    5,368

    Re: Open Source and Security

    I guess it comes down to which you think is more likely:-
    1. that a good actor finds a flaw and fixes it (or reports it and gets it fixed)
    2. that a bad actor finds a flaw and exploits it

    I would say that the chances are roughly equal but option 2 also needs to rely on option 1 to fail. For the bad actor to succeed requires that no good actor spot the exploit and that probably diminishes as the overall volume of actors increases. If any good actor spots the exploit then the bad actor fails. On that basis an Open Source with a massive number of participants is likely to be secure, I think, though it would be an interesting puzzle to game out.
    That sounds reasonable to me. I would add one thing. The bad actor only has to find one thing the reviewers didn't notice to make the software insecure.

    Don't take that as I'm against open source. I'm not qualified to say, it's just a thought.

  15. #55

    Thread Starter
    PowerPoster Elroy's Avatar
    Join Date
    Jun 2014
    Location
    Near Nashville TN
    Posts
    10,788

    Re: Open Source and Security

    Funky's comment regarding risks of open source:

    Quote Originally Posted by FunkyDexter View Post
    I guess it comes down to which you think is more likely:-
    1. that a good actor finds a flaw and fixes it (or reports it and gets it fixed)
    2. that a bad actor finds a flaw and exploits it
    Personally, I chalk that up as a strength of open source (even if #1 and #2 are 50/50). Particularly for widely used closed source applications (even those from Microsoft, Apple, and others), I think the chances of that closed source code being leaked are relatively high. But, probably, in many of those cases, we never know it's been leaked because the "leakers" or people getting their hands on it don't want to be sued.

    And, if they've got it, they're "bad actors" almost by definition.

    So, if we assume (admittedly arguable) that all source code is either "leaked" or "open source", wouldn't we rather have the eyeballs of good actors on it? And this will only happen in the open source case.

    IDK, I tend to believe that software like Windows and Office haven't been leaked, but would we ever know? Back in the day, I got my hands on the full source code of MS-DOS that was somehow leaked. And I'll die thinking that Bill Gates got his hands on the source code to CP/M to write MS-DOS (which became the foundation for Windows).

    And then we can turn to the open source of Unix/Linux, which is the most stable OS out there.
    Last edited by Elroy; Apr 2nd, 2025 at 09:09 AM.
    Any software I post in these forums written by me is provided "AS IS" without warranty of any kind, expressed or implied, and permission is hereby granted, free of charge and without restriction, to any person obtaining a copy. To all, peace and happiness.

  16. #56
    Super Moderator Shaggy Hiker's Avatar
    Join Date
    Aug 2002
    Location
    Idaho
    Posts
    39,801

    Re: Open Source and Security

    I lean that way, as well. If the sense of safety rests on the assumption that no bad actor has seen the code, that's a pretty dubious footing.
    My usual boring signature: Nothing

  17. #57
    PowerPoster
    Join Date
    Sep 2005
    Location
    Modesto, Ca.
    Posts
    5,368

    Re: Open Source and Security

    And I'll die thinking that Bill Gates got his hands on the source code to CP/M to write MS-DOS (which became the foundation for Windows).
    Microsoft (and later, Bill Gates) didn't develop the original version of DOS; instead, they purchased the rights to 86-DOS, developed by Tim Paterson at Seattle Computer Products, which was then rebranded as MS-DOS.
    They paid $50k for it. That worked out pretty good.

Page 2 of 2 FirstFirst 12

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  



Click Here to Expand Forum to Full Width