13
submitted 4 weeks ago* (last edited 3 weeks ago) by Davriellelouna@lemmy.world to c/asklemmy@lemmy.world

I support free and open source software (FOSS) like VLC, Qbittorrent, LibreOffice, Gimp...

But why do people say that it's as secure or more secure than closed source software?

From what I understand, closed source software don't disclose their code.

If you want to see the source code of Photoshop, you actually need to work for Adobe. Otherwise, you need to be some kind of freaking retro-engineering expert.

But open source has their code available to the entire world on websites like Github or Gitlab.

Isn't that actually also helping hackers?

top 13 comments
sorted by: hot top controversial new old

You live in some Detroit-like hellscape where everyone everywhere 24/7 wants to kill and eat you and your family. You go shopping for a deadbolt for your front door, and encounter two locksmiths:

Locksmith #1 says "I have invented my own kind of lock. I haven't told anyone how it works, the lock picking community doesn't know shit about this lock. It is a carefully guarded secret, only I am allowed to know the secret recipe of how this lock works."

Locksmith #2 says "Okay so the best lock we've got was designed in the 1980's, the design is well known, the blueprints are publicly available, the locksport and various bad guy communities have had these locks for decades, and the few attacks that they made work were fixed by the manufacturer so they don't work anymore. Nobody has demonstrated a successful attack on the current revision of this lock in the last 16 years.

Which lock are you going to buy?

[-] Kolanaki@pawb.social 3 points 4 weeks ago

If I can see the code, I can see if said code is doing something fucky. If I can't see the code, I have to just have faith that it's not doing something fucky.

You theoretically can see the code. You don’t actually look at it. Nor can you even have the knowledge to understand and see security implications for all the software you use.

In practice it makes little difference for security if you use open or closed source software.

[-] Grenfur@pawb.social 1 points 4 weeks ago

No, you literally can see the code, that's why it's open source. YOU may not look at it, but people do. Random people, complete strangers, unpaid and un-vested in the project. The alternative is a company, who pays people to say "Yeah it's totally safe". That conflict of interest is problematic. Also, depending on what it's written in, yes, I do sometimes take the time. Perhaps not for every single thing I run, but any time I run across niche projects, I read first. To claim that someone can't understand is wild. That's a stranger on the internet, you're knowledge of their expertise is 0.

In practice, 1,000 random people with no reason to "trust you, bro" on the internet being able to audit every change you make to your code is far more trustworthy than a handful of people paid by the company they represent. What's worse, is that if Microsoft were to have a breach, then like maybe 10 people on the planet know about it. 10 people with jobs, mortgages, and families tied to that knowledge. They won't say shit, because they can't lose that paycheck. Compare that to say the XZ backdoor where the source is available and gets announced so people know exactly who what and where to resolve the issue.

[-] CrazyLikeGollum@lemmy.world 3 points 4 weeks ago

It's not "assumed to be secure." The source code being publicly available means you (or anyone else) can audit that code for vulnerabilities. The publicly available issue tracking and change tracking means you can look through bug reports and see if anyone else has found vulnerabilities and you can, through the change history and the bug report history, see how the devs responded to issues in the past, how they fixed it, and whether or not they take security seriously.

Open source software is not assumed to be more secure, but it's security (or lack thereof) is much easier to verify, you don't have to take the word of the dev as to whether or not it is secure, and (especially for the more popular projects like the ones you listed) you have thousands of people with different backgrounds and varying specialties within programming, with no affiliation with and no reason to trust the project doing independent audits of the code.

[-] Lemvi@lemmy.sdf.org 2 points 4 weeks ago

The code being public helps with spotting issues or backdoors.

In practice, "security by obscurity" doesn't really work. The code's security should hinge on the quality of the code itself, not on the amount of people that know it.

[-] WhatAmLemmy@lemmy.world 1 points 4 weeks ago

It also provides some assurance that the service/project/company is doing what they say they are, instead of "trust us".

Meta has deployed code so criminal that everyone who knew about it should be serving hard jail time (if we didn't live in corporate dictatorships). If their code were public they couldn't pull shit like this anywhere near as easily.

[-] philpo@feddit.org 1 points 4 weeks ago

One thing people tend to overlook is: Development costs money. Fixing bugs and exploits costs money.

In a closed source application none will see that your software is still working with arcane concepts that weren't even state-of-the-art when written 25 years ago. The bug that could easily be used as an exploit? Sure, the developer responsible for it did inform his manager around 50 times he needs time and someone from the database team to fix it. And got turned down 50 times as it costs time and "we have to keep deadlines! And none noticed this bug so far,so why should now notice now?"

[-] RodgeGrabTheCat@sh.itjust.works 1 points 4 weeks ago

With open source code you get more eyes on it. Issues get fixed quicker.

With closed source, such as Photoshop, only Adobe can see the code. Maybe there are issues there that could be fixed. Most large companies have a financial interest in having "good enough" security.

[-] DeathByBigSad@sh.itjust.works 1 points 4 weeks ago

Because "some nerd out there probably would have found any exploits for the X years its been released" is the general assumption about open source software.

[-] fmstrat@lemmy.nowsci.com 1 points 3 weeks ago

Others have mentioned this, but to make sure all context is clear:

  • FOSS software is not inherently more secure.
  • New FOSS software is probably as secure as any closed source software, because it likely doesn't have many eyes on it and hasn't been audited.
  • Mature FOSS software will likely have more CVEs reported against it than a closed source alternative, because there are more eyes on it.
  • Because of bullet 3, mature FOSS software is typically more secure than closed source, as security holes are found and patched publicly.
  • This does not mean a particular closed source tool is insecure, it means the community can't prove it is secure.
  • I like proof, so I choose FOSS.
  • Most people agree, which is why most major server software is FOSS (or source available)
  • However that's also because of the permissive licensing.
[-] liquefy4931@lemmy.world 1 points 3 weeks ago

Also keep in mind that employees of companies that release closed source software are obligated to keep secret any gaping security vulnerabilities. This obligation usually comes with heavy legal ramifications that could be considered "life ruining" for many of us. e.g. Loss of your job plus a lawsuit.

Often, none of the contributors to open source software are associated with each other and therefore have no obligation to keep discovered vulnerabilities a secret. In fact, I would assume that many contributors also actively use the software and have a personal interest in getting security vulnerabilities fixed.

[-] Canconda@lemmy.ca -1 points 4 weeks ago* (last edited 4 weeks ago)

Zero day exploits, aka vulnerabilities that aren't publicly known, offer hackers the ability to essentially rob people blind.

Open source code means you have the entire globe of developers collaborating to detect and repair those vulnerabilities. So while it's not inherently more secure, it is in practice.

Exploiting four zero-day flaws in the systems,[8] Stuxnet functions by targeting machines using the Microsoft Windows operating system and networks, then seeking out Siemens Step7 software. Stuxnet reportedly compromised Iranian PLCs, collecting information on industrial systems and causing the fast-spinning centrifuges to tear themselves apart.[3] Stuxnet's design and architecture are not domain-specific and it could be tailored as a platform for attacking modern SCADA and PLC systems (e.g., in factory assembly lines or power plants), most of which are in Europe, Japan and the United States.[9] Stuxnet reportedly destroyed almost one-fifth of Iran's nuclear centrifuges.[10] Targeting industrial control systems, the worm infected over 200,000 computers and caused 1,000 machines to physically degrade.

Stuxnet has three modules: a worm that executes all routines related to the main payload of the attack, a link file that automatically executes the propagated copies of the worm and a rootkit component responsible for hiding all malicious files and processes to prevent detection of Stuxnet.

Wikipedia - Stuxnet Worm

this post was submitted on 14 Aug 2025
13 points (100.0% liked)

Ask Lemmy

34505 readers
247 users here now

A Fediverse community for open-ended, thought provoking questions


Rules: (interactive)


1) Be nice and; have funDoxxing, trolling, sealioning, racism, and toxicity are not welcomed in AskLemmy. Remember what your mother said: if you can't say something nice, don't say anything at all. In addition, the site-wide Lemmy.world terms of service also apply here. Please familiarize yourself with them


2) All posts must end with a '?'This is sort of like Jeopardy. Please phrase all post titles in the form of a proper question ending with ?


3) No spamPlease do not flood the community with nonsense. Actual suspected spammers will be banned on site. No astroturfing.


4) NSFW is okay, within reasonJust remember to tag posts with either a content warning or a [NSFW] tag. Overtly sexual posts are not allowed, please direct them to either !asklemmyafterdark@lemmy.world or !asklemmynsfw@lemmynsfw.com. NSFW comments should be restricted to posts tagged [NSFW].


5) This is not a support community.
It is not a place for 'how do I?', type questions. If you have any questions regarding the site itself or would like to report a community, please direct them to Lemmy.world Support or email info@lemmy.world. For other questions check our partnered communities list, or use the search function.


6) No US Politics.
Please don't post about current US Politics. If you need to do this, try !politicaldiscussion@lemmy.world or !askusa@discuss.online


Reminder: The terms of service apply here too.

Partnered Communities:

Tech Support

No Stupid Questions

You Should Know

Reddit

Jokes

Ask Ouija


Logo design credit goes to: tubbadu


founded 2 years ago
MODERATORS