> What makes you so sure that closed-source companies won't run those same AI scanners on their own code?
How many companies take the time to use penetration testing tools, that have been available for many years, to verify their software (or pay a penetration testing company to do a more thorough job than they have the experience to do internally)?
Some, certainly. Many, possibly. Most, I would wager not.
Going closed source is making the branch secret/private, not making it obscure. Obscurity would be zipping up the open source code (without a password) and leaving it online. Obscurity is just called taking additional steps to recover the information. Your passwords are not obscure strings of characters, they are secrets.
If there is a self-hosted version at all, then the compiled form is out there to be analysed. While compilation and other forms of code transformation that may occur are not 1->1, trivially reversed, operations, they are much closer to bad password security (symmetric encryption or worse) then good (proper hashing with salting/peppering/etc). Heck, depending on the languages/frameworks/other used the code may be hardly compiled or otherwise transformed at all in its distributed form. Tools to aid decompiling and such have existed for practically as long as their forward processes have, so I would say this is still obscurity rather than any higher form of protection.
Even if the back-end is never fully distributed any front-end code obviously has to be, and even if that contains minimal logic, perhaps little more than navigation & validation to avoid excess UA/server round-trip latency, the inputs & outputs are still easily open to investigation (by humans, humans with tools, or more fully automated methods) so by closing source you've only protected yourself from a small subset of vulnerability discovering techniques.
This is all especially true if your system was recently more completely open, unless a complete clean-room rewrite is happening in conjunction with this change.
> SAN FRANCISCO – March 17, 2026 – The Linux Foundation, the nonprofit organization enabling mass innovation through open source, today announced $12.5 million in total grants from Anthropic, AWS, GitHub, Google, Google DeepMind, Microsoft, and OpenAI to strengthen the security of the open source software ecosystem.
It’s almost cute how insignificantly small that amount is considering the companies named. Great for The Linux Foundation of course, but it still feels like they are being cheap as heck.
> if AI can be pointed and find vulnerabilities then do it yourself before publishing the code
At your cost.
Every time you push. (or if not that, at least every time there is a new version that you call a release)
Including every time a dependency updates, unless you pin specific versions.
I assume (caveat: I've not looked into the costs) many projects can't justify that.
Though I don't disagree with you that this looks like a commercial decision with “LLM based bug finders could find all our bad code” as an excuse. The lack of confidence in their own code while open does not instil confidence that it'll be secure enough to trust now closed.
For-profit companies using open-source software should bear that cost - that's my position.
I believe than N companies using an open source project and contributing back would make this burden smaller than one company using the same closed-source project.
I don't think platform guidelines that anyone listens to have been a real thing for a long time. Even between apps released by MS there is little or no consistency at times, things that should be part of standard OS provided chrome like title-bars are a random mess - good luck guessing what has input focus sometimes, particularly with multiple monitors, as you unlock or switch vdesktop, without clicking to make sure.
I keep thinking of writing something that detects the top-most app window and draws an obvious box around it.
Native macOS developers respected Apple's Human Interface Guidelines for a long time, but even that's declining now that everyone needs to work around all the problems with Liquid Glass.
>> I keep thinking of writing something that detects the top-most app window and draws an obvious box around it.
I would use this in a heartbeat. With Windows 10/11 I usually have the option to apply a garish accent color to the active window active. Nowadays, more and more apps don't use native window frames anymore, so that option works less and less.
The W11 task bar with its barely legible indicators doesn't help either.
On a big ultra-wide display with a few windows open, I sometimes struggle to see which one is active.
> > I keep thinking of writing something that detects the top-most app window and draws an obvious box around it.
> I would use this in a heartbeat.
I may one day get around to it. Of the many projects on my “will probably never actually happen” list¹ it is one of the smallest. I did something similar to add other decorations to windows back in my just-post-Uni days². Walking the process list, getting the hWnd(s) you were interested in, and for there the window dimensions, was fairly trivial and it no doubt still is.
----
[1] I mention them here where relevant, in the hopes that someone else will see the ideas and be inspired to implement the them in an open form so I don't have to :-)
[2] ~win2000 era, I was playing in Delphi at the time
How many physical stores sell the alternatives at all? IIRC there is one in Cambridge specifically selling Pi kit and related stuff, but that is about it.
I almost never shop at Target. It's not near to me, and it's not on my list of destinations when I'm away from home.
But I was in Target one day anyway, and they had a Raspberry Pi 3 kit for sale on the shelf. IIRC, it was one of the Google DIY smart speaker kits. I thought that was neat to see.
My usual source for Raspberry Pi stuff is Microcenter. That's also not near to me, but it's a viable destination that's worth a trip all on its own.
At this Microcenter, they move enough Pi hardware that they don't even have them on the shelves anymore. They're instead stocked at each checkout register, and priced at or below MSRP. They're right there alongside a wide assortment of minimally-packaged house-brand SD cards and USB keys and other geek fodder.
It's quick and easy to walk in and grab a couple of spools of printer filament, some 22AWG solid wire for breadboarding, a card of LR44 batteries for the digital calipers, and a Raspberry Pi. (Well, it can be quick. Last time I went, I got sucked into the mechanical keyboard department for an embarrassingly long time.)
Anyway, they also have NUC-shaped computers there if someone wants go that direction instead. Just pick one out, pay for it, and take it home.
With the caveat that I might be slightly out of touch (I have nothing beyond the Pi4/400 and the last x86 mini-box I bought was over a year ago)…
IMO the key benefit of a Pi over an x86/a64 box, assuming you aren't using the IO breakouts and such, is power efficiency (particularly at idle-ish). The benefits of the x86/a64 boxes is computing power and being all-in-one (my need was due to my Pi4-based router becoming the bottleneck when my home line was upgraded to ~Gbit, and I wanted something with 2+ built-in NICs rather than relying on USB so didn't even look into the Pi5). Both options beat other SBC based options due to software support, the x86/a64 machines because support is essentially baked in and the rPi by virtue of the Pi foundation and the wider community making great efforts to plug any holes. A Pi range used to win significantly on price (or at least price/performance) too, but that is not the case these days.
Certainly not everywhere. I definitely remember plenty of tasteless ones, some deliberately so and others just cases of other people's taste differing from mine!
> Does this mean firewalls now have to block all Ethereum endpoints?
Or, instead of attempting to enumerate the bad, if you run WordPress make sure it can't call out anywhere except a whitelist of hosts if some plugins have legitimate reasons to call out. Assuming the black-hat jiggery-pokery is server side of course.
How many companies take the time to use penetration testing tools, that have been available for many years, to verify their software (or pay a penetration testing company to do a more thorough job than they have the experience to do internally)?
Some, certainly. Many, possibly. Most, I would wager not.
reply