Security is an illusion.

Security can mean different things to different people, but in general, it refers to the state of being protected or safe from harm or danger. No system or technology can ever be completely secure or invulnerable to threats, whether it’s a physical security system or a digital one. There are always ways to bypass or circumvent them, and new vulnerabilities and threats can emerge over time.

However, it is important to strive for reasonable security measures, to minimize the risk of harm and protect assets and information. This includes regularly updating and patching systems, implementing robust access controls, monitoring for suspicious activity, and having incident response plans in place. While it’s important to understand risks and take measures to protect assets, it’s also important to be aware that absolute security is not possible.

While it’s important to be prepared to deal with breaches and threats, it’s also important to note that security is not only a technical issue but also a social one. It’s a shared responsibility, involving not only technical measures but also the awareness and action of all individuals, organizations and society as a whole. Unless we decentralize the essential software systems of our society, tyranny will slowly but surely take hold.

Just like a hammer, a screwdriver or a saw, software can be used to accomplish a wide range of tasks. Software is a tool because it is a set of instructions that tell a computer what to do. These instructions are written in a programming language and are designed to perform specific tasks or solve specific problems. Software can be used to automate repetitive tasks, to facilitate communication and collaboration, to process and analyze data, and to create and edit multimedia content, among other things.

Why take a risk with open source software if big-tech can do it for us? Because OSS delivers comparable results to big-tech for fractional risks to our privacy and data-sovereignty.

A life with meaning requires the willingness to take risks and step beyond our comfort zone. By daring ourselves to try new things, we open up an entire world of possibilities for growth, development and learning. But it’s also essential to remember that not all risks are worth taking; be sure of both the potential advantages and disadvantages before leaping into the unknown, stumbling along the way is part of this thrilling journey toward the kingdom of heaven.

Security is mostly a superstition. It does not exist in nature, nor do the children of men as a whole experience it. Avoiding danger is no safer in the long run than outright exposure. Life is either a daring adventure, or nothing.

Helen Keller

When it comes to using open-source software, taking risks can have its benefits. By utilizing open-source code, companies and individuals have access to a wide range of tools and resources that they might not otherwise have. Additionally, the open-source community allows for collaboration and the sharing of knowledge and expertise, which can lead to the creation of better software. 

GPL License: What is it and why should you care?

One of the most popular open-source licenses is the GNU General Public License (GPL) which is used for many different types of software. However, using software that is licensed under the GPL can come with certain business risks. Some of the main risks to consider include:

  1. Compliance: If you plan to utilize GPL-licensed code in your software, then unfortunately the GPL requires that it must also be freely accessible and licensed under the same terms. This can be a worrisome requirement for businesses looking to preserve their proprietary software.
  2. Modification and Distribution: According to the GPL, all alterations of the licensed software must be distributed under this same license. Moreover, should you intend on using it for commercial reasons, then its source code has to accompany said distribution.
  3. Upstream dependency: Companies must be strategic when it comes to incorporating GPLed software since its usage implies that any other dependencies also need to follow the same license, which may not always be suitable for greedy corporations.

In sharp contrast to software licenses that limit your freedom to share and modify works, the GPL was developed with a single goal in mind: guaranteeing users’ right to freely share and edit all versions of any program. This ensures that it remains free for everyone who utilizes it.

Open-source: More secure by letting go of control

Open-source software provides an invaluable advantage—its code is open to the public and can be studied by developers. This means that any security vulnerabilities found in the code can be quickly spotted, fixed, and improved upon; since anyone with access to the source code is able to review it for flaws. As a result of this extra transparency, open-source software has been known to offer greater reliability than closed-sourced applications due its comprehensive analysis from external sources that are not typically available in other types of development environments.

Conversely, with closed-source software the code remains hidden from public view – making it more difficult to perform audit code. Although this means that potential security vulnerabilities are not visible and therefore remain difficult to detect, they can also be kept secret which serves as an additional layer of protection, but only through obscurity.

Science may have found a cure for most evils; but it has found no remedy for the worst of them all—the apathy of human beings.

Helen Keller

“Security through obscurity” is a term used to describe the practice of relying on the secrecy of the design or implementation of a system to provide security. It is generally considered to be a bad idea for a number of reasons:

  1. Secrecy is not a guarantee of security: Just because the design or implementation of a system is not widely known does not mean that it is inherently secure. Skilled attackers will find ways to exploit vulnerabilities, regardless of whether the system is widely known.
  2. Secrecy can create a false sense of security: When a system relies on obscurity for security, it can create a false sense of security among its users. They may believe that the system is more secure than it actually is, which can lead to complacency and a lack of attention to security practices.
  3. Secrecy can lead to missing vulnerabilities: If the design or implementation of a system is not open to scrutiny, it is possible that vulnerabilities may be missed. When multiple people are able to review the code or design, there is a greater chance that potential vulnerabilities will be identified.
  4. Secrecy can make it hard to find and fix issues: If a vulnerability is found in a system that relies on obscurity, it may be difficult or impossible to fix. If the design or implementation is not widely known, it may be hard to find experts who are able to fix the issue, or to distribute patches to all users.

It’s important to note that obscurity should not be considered a form of security measure but rather a defense in depth approach, where a combination of security measures are used to protect the system. Obscurity can be an additional layer of defense, but should not be relied upon as the sole means of security. It’s also worth mentioning that many commercial software companies engage in responsible vulnerability disclosure programs, that allows for security experts to report any vulnerability found to the company, who then fix it accordingly.

We invite you to consider us the stewards of your business’ information systems.

Outsourcing software management makes good sense. It can save time, money, and provide access to expertise and experience, improve efficiency and scalability, enhance flexibility and security, and make budgets more predictable:

  1. Cost savings: It may be more cost-effective for your organizations to avoid the costs of hiring and training in-house staff, as well as the costs of purchasing and maintaining hardware and software; when you a local Alaskan company like ours to assist you.
  2. Expertise: We’re a specialized managed software service provider who can give your organization access to a higher level of expertise and experience. We follow best practices and standards, as well as knowledge of the latest tools and technologies.
  3. Efficiency: Hiring us may improve your organization’s efficiency by allowing in-house staff to focus on their core competencies, rather than being distracted by IT tasks.
  4. Flexibility: We can provide your organization with more flexibility to respond to changing business needs, as well as help you to take advantage of new opportunities from a different, technical perspective.
  5. Compliance and security: We’re a reputable provider and can ensure compliance with regulations and industry standards, as well as improve the security of your organization’s software and data.
  6. Cost predictability: We can make your organization’s IT budget more predictable, as it can be based on a fixed contract or service level agreement rather than on unpredictable in-house costs.

At our firm, we understand that every organization has unique needs and goals. That’s why we offer customized services tailored specifically to meet the requirements of each client. Our years of experience in providing management service solutions have earned us a reputation for success, and our track record speaks for itself.

Christian Thought & OSS

There are different perspectives on how Open Source Software (OSS) relates to Christian thought, depending on the specific interpretation of Christian teachings and theology. Here are a few examples of different perspectives:

  1. Catholic Social Teaching: Catholic Social Teaching emphasizes the importance of the common good and the principles of subsidiarity and solidarity. From this perspective, OSS aligns with these principles by promoting collaboration and the sharing of resources for the benefit of all. OSS also encourages the participation of individuals in the creation and maintenance of software, which can be seen as a form of social participation and empowerment.
  2. Protestant theology: Protestant theology emphasizes the importance of individual responsibility and the concept of “calling.” From this perspective, OSS aligns with these principles by encouraging individual participation and creativity in the development of software. OSS also promotes the idea of personal initiative and the use of one’s talents for the benefit of society, which can be seen as a form of fulfilling one’s calling.
  3. Calvinist theology: Calvinist theology emphasizes the importance of the concept of predestination, the idea that God has predetermined the fate of individuals, and the concept of work ethic, the belief that work is a calling from God. From this perspective, OSS aligns with these principles by promoting the idea of personal initiative and the use of one’s talents for the benefit of society, which can be seen as a form of fulfilling one’s predestined calling.
  4. Liberation theology: Liberation theology emphasizes the importance of social justice and the principles of preferential option for the poor. From this perspective, OSS aligns with these principles by promoting the idea of sharing resources and information, which can be seen as a way to empower marginalized communities and promote social justice.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top