{"id":4041,"date":"2023-07-20T14:47:13","date_gmt":"2023-07-20T09:47:13","guid":{"rendered":"https:\/\/dicecamp.com\/insights\/?p=4041"},"modified":"2023-07-20T14:48:03","modified_gmt":"2023-07-20T09:48:03","slug":"open-source-comes-under-threat-as-legal-efforts-bound-developers-to-create-secure-systems","status":"publish","type":"post","link":"https:\/\/dicecamp.com\/insights\/open-source-comes-under-threat-as-legal-efforts-bound-developers-to-create-secure-systems\/","title":{"rendered":"Open Source comes under Threat as Legal Efforts Bound Developers to Create Secure Systems"},"content":{"rendered":"<p><span style=\"font-weight: 400\">The Cyber Resilience Act \u2018CRA\u2019 that came in September last year drafts a code-of-conduct following which the manufacturers of internet based software and hardware devices\u2013 including IoT devices, computer systems and smart phones\u2013 in Europe are bound to embed security into their products as well as report vulnerabilities that may exist afterwards.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">Penalties for non-compliance may include fines of up to \u20ac15 million, or 2.5% of global turnover.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Though manufacturers in the European Union welcomed the intention of the cyber resilience act, the open source bodies showed concerns over the economic and technological risk it imposes on the EU. More than a dozen open source bodies reached out to the European Commission (EC) at the start of this year writing an open letter that states \u201c<\/span><i><span style=\"font-weight: 400\">their voices are underrepresented in the development of the CRA<\/span><\/i><span style=\"font-weight: 400\"> &#8221;.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">The letter reads:<\/span><\/p>\n<p><span style=\"font-weight: 400\">\u201c<\/span><i><span style=\"font-weight: 400\">Open source software represents more than 70% of the software present in products with digital elements in Europe. Yet, our community does not have the benefit of an established relationship with the co-legislators<\/span><\/i><i><span style=\"font-weight: 400\">.<\/span><\/i><span style=\"font-weight: 400\">\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400\">The Electronics Frontier Foundation (EFF) , which is an organization that protects the technology community from legal injustice, has also raised concerns over the current CRA principles. According to EFF, CRA poses significant damage to the open source community where individual developers code and build systems as an act of good-will and gratitude. These open source softwares are then utilized in almost one quarter of all electronic devices in Europe. Developers may receive money in the form of individual donations, employment in open source tech companies, or foundation grants for building their own systems.<\/span><\/p>\n<p><span style=\"font-weight: 400\">As the CRA poses liability for all bodies involved in commercial activity, it also includes the open source community who gets paid via its traditional revenue streams. This way, following the act, if an open source developer even gets paid a penny, they would come under legal liability and the whole operation will be challenged. This would risk the development operations if developers lack funds.<\/span><\/p>\n<p><span style=\"font-weight: 400\">EFF calls the open source development community of Europe to join in raising concerns and take their voices to the European Commission.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Apart from the individual developers and small-scale organizations, thirteen tech companies in the open source landscape also shared their views including Eclipse Foundation, Linux Foundation Europe, and the Open Source Initiative (OSI). According to them <\/span><span style=\"font-weight: 400\">\u201c[CPR] poses an unnecessary economic and technological risk to the EU.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400\">As the Act is currently in amendment stage, digital product development communities are making themselves knowledgeable on the impacts this potential law can have on their freedom and digital economy.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Cyber Resilience Act \u2018CRA\u2019 that came in September last year drafts a code-of-conduct following which the manufacturers of internet based software and hardware devices\u2013 including IoT devices, computer systems and smart phones\u2013 in Europe are bound to embed security into their products as well as report vulnerabilities that may exist afterwards.\u00a0 Penalties for non-compliance [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":4042,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[51,73],"class_list":{"0":"post-4041","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-devops","8":"tag-devops","9":"tag-news"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.14 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Open Source comes under Threat as Legal Efforts Bound Developers to Create Secure Systems - Dicecamp Insights<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dicecamp.com\/insights\/open-source-comes-under-threat-as-legal-efforts-bound-developers-to-create-secure-systems\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Open Source comes under Threat as Legal Efforts Bound Developers to Create Secure Systems - Dicecamp Insights\" \/>\n<meta property=\"og:description\" content=\"The Cyber Resilience Act \u2018CRA\u2019 that came in September last year drafts a code-of-conduct following which the manufacturers of internet based software and hardware devices\u2013 including IoT devices, computer systems and smart phones\u2013 in Europe are bound to embed security into their products as well as report vulnerabilities that may exist afterwards.\u00a0 Penalties for non-compliance [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dicecamp.com\/insights\/open-source-comes-under-threat-as-legal-efforts-bound-developers-to-create-secure-systems\/\" \/>\n<meta property=\"og:site_name\" content=\"Dicecamp Insights\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-20T09:47:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-20T09:48:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dicecamp.com\/insights\/wp-content\/uploads\/2023\/07\/pexels-hitesh-choudhary-1261427-scaled.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Ayesha\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ayesha\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dicecamp.com\/insights\/open-source-comes-under-threat-as-legal-efforts-bound-developers-to-create-secure-systems\/\",\"url\":\"https:\/\/dicecamp.com\/insights\/open-source-comes-under-threat-as-legal-efforts-bound-developers-to-create-secure-systems\/\",\"name\":\"Open Source comes under Threat as Legal Efforts Bound Developers to Create Secure Systems - Dicecamp Insights\",\"isPartOf\":{\"@id\":\"https:\/\/dicecamp.com\/insights\/#website\"},\"datePublished\":\"2023-07-20T09:47:13+00:00\",\"dateModified\":\"2023-07-20T09:48:03+00:00\",\"author\":{\"@id\":\"https:\/\/dicecamp.com\/insights\/#\/schema\/person\/1b7d4bef40ac58bbedfa718df21e2463\"},\"breadcrumb\":{\"@id\":\"https:\/\/dicecamp.com\/insights\/open-source-comes-under-threat-as-legal-efforts-bound-developers-to-create-secure-systems\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dicecamp.com\/insights\/open-source-comes-under-threat-as-legal-efforts-bound-developers-to-create-secure-systems\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dicecamp.com\/insights\/open-source-comes-under-threat-as-legal-efforts-bound-developers-to-create-secure-systems\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dicecamp.com\/insights\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Open Source comes under Threat as Legal Efforts Bound Developers to Create Secure Systems\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dicecamp.com\/insights\/#website\",\"url\":\"https:\/\/dicecamp.com\/insights\/\",\"name\":\"Dicecamp Insights\",\"description\":\"All Things Tech!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dicecamp.com\/insights\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/dicecamp.com\/insights\/#\/schema\/person\/1b7d4bef40ac58bbedfa718df21e2463\",\"name\":\"Ayesha\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dicecamp.com\/insights\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fc0617698baa4b6b794771cffa4c63de5ee5febb87eef29e53208d83b8be582e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fc0617698baa4b6b794771cffa4c63de5ee5febb87eef29e53208d83b8be582e?s=96&d=mm&r=g\",\"caption\":\"Ayesha\"},\"description\":\"I engineer the content and acquaint the science of analytics to empower rookies and professionals.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/ayesha-saeed-13as96\/\"],\"url\":\"https:\/\/dicecamp.com\/insights\/author\/ayesha\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Open Source comes under Threat as Legal Efforts Bound Developers to Create Secure Systems - Dicecamp Insights","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dicecamp.com\/insights\/open-source-comes-under-threat-as-legal-efforts-bound-developers-to-create-secure-systems\/","og_locale":"en_US","og_type":"article","og_title":"Open Source comes under Threat as Legal Efforts Bound Developers to Create Secure Systems - Dicecamp Insights","og_description":"The Cyber Resilience Act \u2018CRA\u2019 that came in September last year drafts a code-of-conduct following which the manufacturers of internet based software and hardware devices\u2013 including IoT devices, computer systems and smart phones\u2013 in Europe are bound to embed security into their products as well as report vulnerabilities that may exist afterwards.\u00a0 Penalties for non-compliance [&hellip;]","og_url":"https:\/\/dicecamp.com\/insights\/open-source-comes-under-threat-as-legal-efforts-bound-developers-to-create-secure-systems\/","og_site_name":"Dicecamp Insights","article_published_time":"2023-07-20T09:47:13+00:00","article_modified_time":"2023-07-20T09:48:03+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/dicecamp.com\/insights\/wp-content\/uploads\/2023\/07\/pexels-hitesh-choudhary-1261427-scaled.webp","type":"image\/webp"}],"author":"Ayesha","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ayesha","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/dicecamp.com\/insights\/open-source-comes-under-threat-as-legal-efforts-bound-developers-to-create-secure-systems\/","url":"https:\/\/dicecamp.com\/insights\/open-source-comes-under-threat-as-legal-efforts-bound-developers-to-create-secure-systems\/","name":"Open Source comes under Threat as Legal Efforts Bound Developers to Create Secure Systems - Dicecamp Insights","isPartOf":{"@id":"https:\/\/dicecamp.com\/insights\/#website"},"datePublished":"2023-07-20T09:47:13+00:00","dateModified":"2023-07-20T09:48:03+00:00","author":{"@id":"https:\/\/dicecamp.com\/insights\/#\/schema\/person\/1b7d4bef40ac58bbedfa718df21e2463"},"breadcrumb":{"@id":"https:\/\/dicecamp.com\/insights\/open-source-comes-under-threat-as-legal-efforts-bound-developers-to-create-secure-systems\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dicecamp.com\/insights\/open-source-comes-under-threat-as-legal-efforts-bound-developers-to-create-secure-systems\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/dicecamp.com\/insights\/open-source-comes-under-threat-as-legal-efforts-bound-developers-to-create-secure-systems\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dicecamp.com\/insights\/"},{"@type":"ListItem","position":2,"name":"Open Source comes under Threat as Legal Efforts Bound Developers to Create Secure Systems"}]},{"@type":"WebSite","@id":"https:\/\/dicecamp.com\/insights\/#website","url":"https:\/\/dicecamp.com\/insights\/","name":"Dicecamp Insights","description":"All Things Tech!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dicecamp.com\/insights\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/dicecamp.com\/insights\/#\/schema\/person\/1b7d4bef40ac58bbedfa718df21e2463","name":"Ayesha","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dicecamp.com\/insights\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fc0617698baa4b6b794771cffa4c63de5ee5febb87eef29e53208d83b8be582e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fc0617698baa4b6b794771cffa4c63de5ee5febb87eef29e53208d83b8be582e?s=96&d=mm&r=g","caption":"Ayesha"},"description":"I engineer the content and acquaint the science of analytics to empower rookies and professionals.","sameAs":["https:\/\/www.linkedin.com\/in\/ayesha-saeed-13as96\/"],"url":"https:\/\/dicecamp.com\/insights\/author\/ayesha\/"}]}},"_links":{"self":[{"href":"https:\/\/dicecamp.com\/insights\/wp-json\/wp\/v2\/posts\/4041","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dicecamp.com\/insights\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dicecamp.com\/insights\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dicecamp.com\/insights\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/dicecamp.com\/insights\/wp-json\/wp\/v2\/comments?post=4041"}],"version-history":[{"count":3,"href":"https:\/\/dicecamp.com\/insights\/wp-json\/wp\/v2\/posts\/4041\/revisions"}],"predecessor-version":[{"id":4048,"href":"https:\/\/dicecamp.com\/insights\/wp-json\/wp\/v2\/posts\/4041\/revisions\/4048"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dicecamp.com\/insights\/wp-json\/wp\/v2\/media\/4042"}],"wp:attachment":[{"href":"https:\/\/dicecamp.com\/insights\/wp-json\/wp\/v2\/media?parent=4041"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dicecamp.com\/insights\/wp-json\/wp\/v2\/categories?post=4041"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dicecamp.com\/insights\/wp-json\/wp\/v2\/tags?post=4041"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}