Why is so much of the internet’s infrastructure run by volunteers?

  • 📰 TheEconomist
  • ⏱ Reading Time:
  • 33 sec. here
  • 2 min. at publisher
  • 📊 Quality Score:
  • News: 17%
  • Publisher: 92%

Technology Technology Headlines News

Technology Technology Latest News,Technology Technology Headlines

Malware smuggled into XZ Utils software highlights a bigger problem

, a tool used to encrypt anything from social-media passwords to e-commerce purchases, had a fatal flaw that made the information it was supposed to protect visible to potential hackers. The discovery was unsurprising to anyone who knew about the team behind Open. The software, used by almost 20% of websites—including tech companies making billions of dollars in annual profits—was largely run by two men named Steve, who worked on it in their spare time.

In part it is a quirk of history, says Mar Hicks, a historian of technology at the University of Virginia. The internet has been decentralised since its founding: businesses share control with academics and hobbyists.

If the tech companies won’t build better infrastructure themselves, there is still a way to improve internet security: to pay organisations, like Open, enough to employ others to do it. But for that to work, tech companies would need to band together—compelled by governments, if necessary—to provide consistent funding, rather than splurging when something goes wrong and forgetting about the problem when attention subsides.

 

Thank you for your comment. Your comment will be published after being reviewed.
Please try again later.
We have summarized this news so that you can read it quickly. If you are interested in the news, you can read the full text here. Read more:

 /  🏆 6. in TECHNOLOGY

Technology Technology Latest News, Technology Technology Headlines

Similar News:You can also read news stories similar to this one that we have collected from other news sources.

AI hallucinates software packages and devs download them – even if potentially poisoned with malwareSimply look out for libraries imagined by ML and make them real, with actual malicious code. No wait, don't do that
Source: TheRegister - 🏆 67. / 61 Read more »