• fubo@lemmy.world
    link
    fedilink
    arrow-up
    96
    arrow-down
    1
    ·
    1 year ago

    enterprises

    … can pay engineers, rather than expecting volunteers to fix everything for them.

    • HumanPenguin@feddit.uk
      link
      fedilink
      English
      arrow-up
      26
      ·
      1 year ago

      while still paying less then the commercial OSes. That have been the victims of the vast majority of attacks and cost to corps using them.

      Its not like other OSes are attack free. Not requiring qualified engineers to keep them protected.

      That said. Ubuntu and their snap store are asking for trouble .

    • tal@kbin.social
      link
      fedilink
      arrow-up
      3
      arrow-down
      1
      ·
      1 year ago

      Ehh…Not really a mechanism for that that I can see. I mean, say that there’s demand for that, which I can believe. Do I go to a given distro and buy a “security hardened” version? I don’t see how that would work. Is the distro going to refrain from incorporating security fixes into the “non-hardened” free version?

      • jntesteves@lemmy.world
        link
        fedilink
        arrow-up
        4
        ·
        edit-2
        1 year ago

        If you have read it, you might have noticed that the theme of the article is a company called Chainguard. Enterprises can pay them and get a secure software supply chain all the way down to the container image. More than that, their container distro is actually free and open-source, anyone can use it for free, it’s a one line change in your build script to go from Alpine to Wolfi. Enterprises can also buy a secure OS for bare-metal from Red Hat, SUSE, etc…

  • jntesteves@lemmy.world
    link
    fedilink
    arrow-up
    31
    ·
    1 year ago

    This article lacks focus and mixes unrelated security concepts in questionable ways. It ends like just an ad for Wolfi. Don’t get me wrong, Wolfi is neat, it’s probably deserving of being talked up. But it doesn’t solve the supply-chain issues pointed out by the article (it doesn’t even try). Supply-chain attacks are currently not a major issue in Linux distributions, and enterprises are already tackling the issue of provenance elsewhere, and the article itself notes that. Dependency management for enterprise software is NOT the responsibility of Linux distros. So what is the point of the article? To me, this article is security mumble jumbo.

  • michaelrose@lemmy.ml
    link
    fedilink
    English
    arrow-up
    24
    ·
    1 year ago

    Are we suggesting that rich people who get a product for free and use it to forklift more piles of money into their scrooge mcDuck like vault ought to demand more accountability from the people who provided the free forklift.

    How about they pay for that?

  • Sina@beehaw.org
    link
    fedilink
    arrow-up
    7
    ·
    1 year ago

    They’re installing packages to get the latest and greatest as fast as possible but losing trust guarantees in the process.

    Okay…

  • andruid@lemmy.ml
    link
    fedilink
    arrow-up
    6
    ·
    1 year ago

    We need more need to normalize companies stepping up to pay for security development for opensource products they utilize. If companies aren’t putting FTEs to cover their risk of using a product or service then they should be held liable for any damages that causes them or their customers. This is for more than FOSS and for more than CVEs but also critical errors that cause delays in business continuity.

    The issue is many c suite are just now under standing this and many justice systems seem behind on this.

  • Perroboc@lemmy.world
    link
    fedilink
    arrow-up
    4
    ·
    1 year ago

    Matt Asay runs developer relations at MongoDB. The views expressed herein are Matt’s and do not reflect those of his employer.

    Well that explains a lot