{"id":9211,"date":"2019-11-30T08:24:26","date_gmt":"2019-11-30T16:24:26","guid":{"rendered":"https:\/\/www.inmotionhosting.com\/blog\/?p=9211"},"modified":"2024-01-23T14:28:25","modified_gmt":"2024-01-23T19:28:25","slug":"computer-security-day","status":"publish","type":"post","link":"https:\/\/www.inmotionhosting.com\/blog\/computer-security-day\/","title":{"rendered":"National Computer Security Day &#8211; How Volunteers Fixed The Worst Vulnerability On The Web"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2019\/09\/security-265130_1920-1024x683.jpg\" alt=\"National Computer Security Day \u2013 How Volunteers Fixed The Worst Vulnerability On The Web\" class=\"wp-image-8892 skip_lazy\" srcset=\"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2019\/09\/security-265130_1920-1024x683.jpg 1024w, https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2019\/09\/security-265130_1920-300x200.jpg 300w, https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2019\/09\/security-265130_1920-768x512.jpg 768w, https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2019\/09\/security-265130_1920-560x373.jpg 560w, https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2019\/09\/security-265130_1920.jpg 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>\nNovember 30th is Computer Security Day. It&#8217;s easy to take for granted how networks and technology have made life much easier. And it&#8217;s even easier to go by without even noticing how much of our daily lives on the Internet rely upon security protocols invented and maintained by people we&#8217;ve never heard of. We can&#8217;t thank these people if we don&#8217;t even know who they are.\n<\/p>\n\n<div id=\"outline-container-org673e473\" class=\"outline-2\">\n<h2 id=\"openssl\"><a id=\"org673e473\"><\/a>How OpenSSL Opened The Web For Business<\/h2>\n<div class=\"outline-text-2\" id=\"text-openssl\">\n<p>\nIt&#8217;s difficult to remember a time in which purchasing products online was little more than a pipe dream. Now, credit card transactions can be securely transmitted across the web without anyone&#8217;s data being compromised. A set of encryption tools developed in the late 1990s makes this possible. OpenSSL took the complicated task of encrypting data and made it easier for developers all over the world to adopt into their programs. And a small team of volunteers made it happen. Yes, <i>volunteers<\/i>.\n<\/p>\n<\/div>\n<\/div>\n\n<div id=\"outline-container-org6ed09e8\" class=\"outline-2\">\n<h2 id=\"free-development\"><a id=\"org6ed09e8\"><\/a>People Do Free Development?<\/h2>\n<div class=\"outline-text-2\" id=\"text-free-development\">\n<p>\nIt&#8217;s hard to imagine large teams of developers all over the world contributing free labor to maintain some of the world&#8217;s most important software tools. In many cases, contributing code to these projects is considered a public service. Some of the developers are professionals who contribute in their free time, some are students honing their craft, and some are god-knows-what. \n<\/p>\n\n<p>\nIt&#8217;s fair to ask, what if there&#8217;s a bug in OpenSSL? What are the incentives for these unpaid volunteers to fix it? No need to wonder about that when you consider the history of the &#8220;worst vulnerability found\u2026since commercial traffic began to flow on the Internet.&#8221;<sup><a id=\"fnr.1\" class=\"footref\" href=\"#fn.1\">1<\/a><\/sup>\n<\/p>\n<\/div>\n<\/div>\n\n<div id=\"outline-container-orgf43b596\" class=\"outline-2\">\n<h2 id=\"heartbleedstory\"><a id=\"orgf43b596\"><\/a>The Heartbleed Story<\/h2>\n<div class=\"outline-text-2\" id=\"text-heartbleedstory\">\n<p>\nDevelopment of OpenSSL continued in virtual obscurity. Outside of software engineering and national security circles, few people even knew what it was. But the project was soon to gain some national attention in the form of a bug nicknamed &#8220;heartbleed&#8221; discovered by an engineer at Google. Heartbleed, if exploited, could potentially allow hackers to gleen sensitive data (like credit card numbers and email addresses) being exchanged across the web.\n<\/p>\n\n<p>\nA U.S. Department of Defense security consultant named Stephen Marquess, who had also contributed code to the project, helped create the OpenSSL Foundation in order to generate funds to keep OpenSSL alive. Marquess made a public call for support for the team to prevent future bugs from escaping detection for as long as heartbleed did:\n<\/p>\n\n<blockquote>\n<p>\n&#8220;These guys don&#8217;t work on OpenSSL for money. They don&#8217;t do it for fame (who outside of geek circles ever heard of OpenSSL until &#8220;heartbleed&#8221; hit the news?). They do it out of pride in craftsmanship and the responsibility for something they believe in.&#8221;\n<\/p>\n<\/blockquote>\n<\/div>\n<\/div>\n\n<div id=\"outline-container-orgc1c40e2\" class=\"outline-2\">\n<h2 id=\"helpsupport\"><a id=\"orgc1c40e2\"><\/a>How You Can Help Support Open Source Security Projects<\/h2>\n<div class=\"outline-text-2\" id=\"text-helpsupport\">\n<p>\nHeartbleed turned out to be a blessing in disguise. The discovery of the bug generated more monetary support for the OpenSSL project. But the future may hold new complications. The open source business model\u2014or lack thereof\u2014makes it difficult to guarantee funding for important projects. You can <a href=\"https:\/\/www.openssl.org\/support\/\" target=\"_blank\" rel=\"noopener noreferrer\">donate to the OpenSSL project<\/a> through their website, but there are many more software tools out there lacking the support to survive. \n<\/p>\n\n<p>\nIf you&#8217;re interested in supporting open source projects, here&#8217;s where you can start:\n<\/p>\n\n<ul class=\"org-ul\">\n<li>Find the project website or GitHub page<\/li>\n<li>See who the contributors are<\/li>\n<li>Check to see if they are accepting donations<\/li>\n<li>Share the project with others<\/li>\n<li>Consider becoming a contributor<\/li>\n<\/ul>\n\n<p>\nInMotion Hosting deploys hundreds of open source programs of all sizes and complexities with their hosting products and wishes to express their gratitude for the people behind the scenes who make it all possible by donating their time and intellectual resources.\n<\/p>\n\n<p>\nOpen source projects start up and fade away all the time. Without support from community volunteers or a sustainable business model, your favorite project might disappear. So get involved today.\n<\/p>\n<\/div>\n<\/div>\n<div id=\"footnotes\">\n<h2 class=\"footnotes\">Footnotes: <\/h2>\n<div id=\"text-footnotes\">\n\n<div class=\"footdef\"><sup><a id=\"fn.1\" class=\"footnum\" href=\"#fnr.1\">1<\/a><\/sup> <div class=\"footpara\">See &#8220;Roads and Bridges: The Unseen Labor Behind Our Digital Infrastructure&#8221; by Nadia Eghbal for the complete heartbleed story.<\/div><\/div>\n\n\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>November 30th is Computer Security Day. It&#8217;s easy to take for granted how networks and technology have made life much easier. And it&#8217;s even easier to go by without even noticing how much of our daily lives on the Internet rely upon security protocols invented and maintained by people we&#8217;ve never heard of. We can&#8217;t<a class=\"moretag\" href=\"https:\/\/www.inmotionhosting.com\/blog\/computer-security-day\/\"> Read More ><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[371],"tags":[],"class_list":["post-9211","post","type-post","status-publish","format-standard","hentry","category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Computer Security Day - Fixing The Worst Vulnerability On The Web<\/title>\n<meta name=\"description\" content=\"November 30th is Computer Security Day. It&#039;s easy to take for granted how networks and technology have made life much easier.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inmotionhosting.com\/blog\/computer-security-day\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Computer Security Day - Fixing The Worst Vulnerability On The Web\" \/>\n<meta property=\"og:description\" content=\"November 30th is Computer Security Day. It&#039;s easy to take for granted how networks and technology have made life much easier.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inmotionhosting.com\/blog\/computer-security-day\/\" \/>\n<meta property=\"og:site_name\" content=\"InMotion Hosting Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/inmotionhosting\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-30T16:24:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-23T19:28:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2019\/09\/security-265130_1920-1024x683.jpg\" \/>\n<meta name=\"author\" content=\"InMotion Hosting\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@inmotionhosting\" \/>\n<meta name=\"twitter:site\" content=\"@inmotionhosting\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"InMotion Hosting\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Computer Security Day - Fixing The Worst Vulnerability On The Web","description":"November 30th is Computer Security Day. It's easy to take for granted how networks and technology have made life much easier.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inmotionhosting.com\/blog\/computer-security-day\/","og_locale":"en_US","og_type":"article","og_title":"Computer Security Day - Fixing The Worst Vulnerability On The Web","og_description":"November 30th is Computer Security Day. It's easy to take for granted how networks and technology have made life much easier.","og_url":"https:\/\/www.inmotionhosting.com\/blog\/computer-security-day\/","og_site_name":"InMotion Hosting Blog","article_publisher":"https:\/\/www.facebook.com\/inmotionhosting","article_published_time":"2019-11-30T16:24:26+00:00","article_modified_time":"2024-01-23T19:28:25+00:00","og_image":[{"url":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2019\/09\/security-265130_1920-1024x683.jpg","type":"","width":"","height":""}],"author":"InMotion Hosting","twitter_card":"summary_large_image","twitter_creator":"@inmotionhosting","twitter_site":"@inmotionhosting","twitter_misc":{"Written by":"InMotion Hosting","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/www.inmotionhosting.com\/blog\/computer-security-day\/#article","isPartOf":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/computer-security-day\/"},"author":{"name":"InMotion Hosting","@id":"https:\/\/www.inmotionhosting.com\/blog\/#\/schema\/person\/f21a89c83c7697a760c96cfe58e646bc"},"headline":"National Computer Security Day &#8211; How Volunteers Fixed The Worst Vulnerability On The Web","datePublished":"2019-11-30T16:24:26+00:00","dateModified":"2024-01-23T19:28:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/computer-security-day\/"},"wordCount":678,"commentCount":0,"publisher":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/computer-security-day\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2019\/09\/security-265130_1920-1024x683.jpg","articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inmotionhosting.com\/blog\/computer-security-day\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inmotionhosting.com\/blog\/computer-security-day\/","url":"https:\/\/www.inmotionhosting.com\/blog\/computer-security-day\/","name":"Computer Security Day - Fixing The Worst Vulnerability On The Web","isPartOf":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/computer-security-day\/#primaryimage"},"image":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/computer-security-day\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2019\/09\/security-265130_1920-1024x683.jpg","datePublished":"2019-11-30T16:24:26+00:00","dateModified":"2024-01-23T19:28:25+00:00","description":"November 30th is Computer Security Day. It's easy to take for granted how networks and technology have made life much easier.","breadcrumb":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/computer-security-day\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inmotionhosting.com\/blog\/computer-security-day\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inmotionhosting.com\/blog\/computer-security-day\/#primaryimage","url":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2019\/09\/security-265130_1920-1024x683.jpg","contentUrl":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2019\/09\/security-265130_1920-1024x683.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.inmotionhosting.com\/blog\/computer-security-day\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inmotionhosting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.inmotionhosting.com\/blog\/security\/"},{"@type":"ListItem","position":3,"name":"National Computer Security Day &#8211; How Volunteers Fixed The Worst Vulnerability On The Web"}]},{"@type":"WebSite","@id":"https:\/\/www.inmotionhosting.com\/blog\/#website","url":"https:\/\/www.inmotionhosting.com\/blog\/","name":"InMotion Hosting Blog","description":"Web Hosting Strategy, Trends and Security","publisher":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inmotionhosting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.inmotionhosting.com\/blog\/#organization","name":"InMotion Hosting","url":"https:\/\/www.inmotionhosting.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inmotionhosting.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2019\/11\/imh-logo-all-colors-big.jpg","contentUrl":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2019\/11\/imh-logo-all-colors-big.jpg","width":1630,"height":430,"caption":"InMotion Hosting"},"image":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/inmotionhosting","https:\/\/x.com\/inmotionhosting"]},{"@type":"Person","@id":"https:\/\/www.inmotionhosting.com\/blog\/#\/schema\/person\/f21a89c83c7697a760c96cfe58e646bc","name":"InMotion Hosting","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/eb965eada0c0513dd2e1976b21fe270fa4f19ac273960fc080f9d46b81b353a4?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/eb965eada0c0513dd2e1976b21fe270fa4f19ac273960fc080f9d46b81b353a4?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/eb965eada0c0513dd2e1976b21fe270fa4f19ac273960fc080f9d46b81b353a4?s=96&r=g","caption":"InMotion Hosting"},"url":"https:\/\/www.inmotionhosting.com\/blog\/author\/imhmainadmin\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"primary_category":{"id":371,"name":"Security","slug":"security","link":"https:\/\/www.inmotionhosting.com\/blog\/security\/"},"_links":{"self":[{"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/posts\/9211","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/comments?post=9211"}],"version-history":[{"count":6,"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/posts\/9211\/revisions"}],"predecessor-version":[{"id":73018,"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/posts\/9211\/revisions\/73018"}],"wp:attachment":[{"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/media?parent=9211"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/categories?post=9211"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/tags?post=9211"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}