Benjamin Carr, Ph.D. 👨🏻💻🧬<p>How to make <a href="https://hachyderm.io/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://hachyderm.io/tags/software" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>software</span></a> more secure<br>The <a href="https://hachyderm.io/tags/xz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>xz</span></a> attack, which followed other well-known cybersecurity incidents involving open source software like <a href="https://hachyderm.io/tags/Heartbleed" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Heartbleed</span></a>, <a href="https://hachyderm.io/tags/Shellshock" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Shellshock</span></a>, and <a href="https://hachyderm.io/tags/Log4j" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Log4j</span></a>, was another stark reminder that open source software, given how widespread it is, can pose significant <a href="https://hachyderm.io/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> risks. <br><a href="https://techcrunch.com/2024/11/01/how-to-make-open-source-software-more-secure/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2024/11/01/how-</span><span class="invisible">to-make-open-source-software-more-secure/</span></a> <a href="https://hachyderm.io/tags/itsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>itsec</span></a></p>