{"id":4187,"date":"2023-02-28T08:54:21","date_gmt":"2023-02-28T13:54:21","guid":{"rendered":"https:\/\/www.lpi.org\/open-source-myth-intruders-can-more-easily-find-flaws\/"},"modified":"2023-07-31T08:32:01","modified_gmt":"2023-07-31T12:32:01","slug":"open-source-myth-intruders-can-more-easily-find-flaws","status":"publish","type":"post","link":"https:\/\/www.lpi.org\/es\/blog\/2023\/02\/28\/open-source-myth-intruders-can-more-easily-find-flaws\/","title":{"rendered":"Open Source Myth: That Intruders Can More Easily Find Flaws"},"content":{"rendered":"<p>People who think that open source suffers from poor quality often air this myth as well. It seems superficially to make sense, because malicious attackers can read open code and find bugs they can exploit. These bugs are often called \u201czero-day vulnerabilities\u201dbecause they exist in software when it is first released, and the intruder might find the flaw before legitimate developers and security researchers.<\/p>\n<p>But consider this: Why are modern security tools (such as the encryption methods used to send data securely over the Web) open source?<\/p>\n<p>In fact, security researchers prefer tools that are open source. This allows a wide range of experts to review the code. Proprietary tools generally are insufficiently reviewed by security experts, and therefore have flaws.<\/p>\n<p>Yes, open source tools still have security flaws. But the rate is about the same as proprietary software. Malicious attackers can use disassemblers and other tools to slice through the obscurity of proprietary code and discover its flaws.<\/p>\n<p>There is a practice in the computer field called \u00absecurity through obscurity.\u00bb This practice is based on the hope that nobody will break into your system because they won&#8217;t find it or won&#8217;t know where its weaknesses lie.<\/p>\n<p>For instance, because many tools such as Google Docs assign URLs or file names containing long strings of random characters, many people think they don&#8217;t have to protect the documents any further. Security through obscurity is the principle behind hiding source code.<\/p>\n<p>Security through obscurity is sometimes useful in conjunction with other, more robust practices such as encryption. But the principle is generally disparaged by security experts because sophisticated attackers can find ways around obscurity. In this age of fast, massive calculations that can analyze terabytes of data quickly, it becomes less and less feasible to hide what you&#8217;re doing just by keeping it secret.<\/p>\n<p class=\"rtecenter\" style=\"text-align: center;\"><a href=\"https:\/\/www.lpi.org\/blog\/2023\/02\/17\/open-source-myth-it-will-be-incompatible-software-colleagues-use\">&lt;&lt; Read the previous post of this series<\/a>\u00a0|\u00a0<a href=\"https:\/\/www.lpi.org\/blog\/2023\/03\/10\/open-source-myth-it-has-higher-total-cost-ownership-tco\">Read the next post of this series &gt;&gt;<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>People who think that open source suffers from poor quality often air this myth as well. It seems superficially to make sense, because malicious attackers can read open code and find bugs they can exploit. These bugs are often called &#8230; <a href=\"https:\/\/www.lpi.org\/es\/blog\/2023\/02\/28\/open-source-myth-intruders-can-more-easily-find-flaws\/\" class=\"button-link\">Leer m\u00e1s<\/a><\/p>\n","protected":false},"author":44,"featured_media":3455,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[12],"country":[],"language":[465],"ppma_author":[495],"class_list":["post-4187","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sin-categorizar","language-ingles"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Open Source Myth: That Intruders Can More Easily Find Flaws - Linux Professional Institute (LPI)<\/title>\n<meta name=\"description\" content=\"This myth is often spread. But why are modern security tools (such as the encryption methods used to send data securely over the Web) open source?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.lpi.org\/es\/blog\/2023\/02\/28\/open-source-myth-intruders-can-more-easily-find-flaws\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Open Source Myth: That Intruders Can More Easily Find Flaws\" \/>\n<meta property=\"og:description\" content=\"This myth is often spread. But why are modern security tools (such as the encryption methods used to send data securely over the Web) open source?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.lpi.org\/es\/blog\/2023\/02\/28\/open-source-myth-intruders-can-more-easily-find-flaws\/\" \/>\n<meta property=\"og:site_name\" content=\"Linux Professional Institute (LPI)\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/LPIConnect\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-28T13:54:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-31T12:32:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.lpi.org\/wp-content\/uploads\/2023\/02\/tw-li-fb-Open-Source-Myths-EP4.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Andrew Oram\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lpiconnect\" \/>\n<meta name=\"twitter:site\" content=\"@lpiconnect\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andrew Oram\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/blog\\\/2023\\\/02\\\/28\\\/open-source-myth-intruders-can-more-easily-find-flaws\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/blog\\\/2023\\\/02\\\/28\\\/open-source-myth-intruders-can-more-easily-find-flaws\\\/\"},\"author\":{\"name\":\"Andrew Oram\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/#\\\/schema\\\/person\\\/3406dc82718aebf8c9e647fe3a54116a\"},\"headline\":\"Open Source Myth: That Intruders Can More Easily Find Flaws\",\"datePublished\":\"2023-02-28T13:54:21+00:00\",\"dateModified\":\"2023-07-31T12:32:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/blog\\\/2023\\\/02\\\/28\\\/open-source-myth-intruders-can-more-easily-find-flaws\\\/\"},\"wordCount\":335,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/blog\\\/2023\\\/02\\\/28\\\/open-source-myth-intruders-can-more-easily-find-flaws\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/article-Open-Source-Myths-EP4.jpg\",\"articleSection\":[\"Sin categorizar\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.lpi.org\\\/es\\\/blog\\\/2023\\\/02\\\/28\\\/open-source-myth-intruders-can-more-easily-find-flaws\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/blog\\\/2023\\\/02\\\/28\\\/open-source-myth-intruders-can-more-easily-find-flaws\\\/\",\"url\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/blog\\\/2023\\\/02\\\/28\\\/open-source-myth-intruders-can-more-easily-find-flaws\\\/\",\"name\":\"Open Source Myth: That Intruders Can More Easily Find Flaws - Linux Professional Institute (LPI)\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/blog\\\/2023\\\/02\\\/28\\\/open-source-myth-intruders-can-more-easily-find-flaws\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/blog\\\/2023\\\/02\\\/28\\\/open-source-myth-intruders-can-more-easily-find-flaws\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/article-Open-Source-Myths-EP4.jpg\",\"datePublished\":\"2023-02-28T13:54:21+00:00\",\"dateModified\":\"2023-07-31T12:32:01+00:00\",\"description\":\"This myth is often spread. But why are modern security tools (such as the encryption methods used to send data securely over the Web) open source?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/blog\\\/2023\\\/02\\\/28\\\/open-source-myth-intruders-can-more-easily-find-flaws\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.lpi.org\\\/es\\\/blog\\\/2023\\\/02\\\/28\\\/open-source-myth-intruders-can-more-easily-find-flaws\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/blog\\\/2023\\\/02\\\/28\\\/open-source-myth-intruders-can-more-easily-find-flaws\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/article-Open-Source-Myths-EP4.jpg\",\"contentUrl\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/article-Open-Source-Myths-EP4.jpg\",\"width\":1440,\"height\":994},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/blog\\\/2023\\\/02\\\/28\\\/open-source-myth-intruders-can-more-easily-find-flaws\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Open Source Myth: That Intruders Can More Easily Find Flaws\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/\",\"name\":\"Linux Professional Institute (LPI)\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/#organization\",\"name\":\"Linux Professional Institute (LPI)\",\"url\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/logo.png\",\"contentUrl\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/logo.png\",\"width\":496,\"height\":175,\"caption\":\"Linux Professional Institute (LPI)\"},\"image\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/LPIConnect\",\"https:\\\/\\\/x.com\\\/lpiconnect\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/35136\",\"https:\\\/\\\/www.instagram.com\\\/lpi_org\\\/\",\"https:\\\/\\\/fosstodon.org\\\/@LPI\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/#\\\/schema\\\/person\\\/3406dc82718aebf8c9e647fe3a54116a\",\"name\":\"Andrew Oram\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/cropped-andy-oram-bio-96x96.jpgdbb3f146554e46589556139ade4d760d\",\"url\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/cropped-andy-oram-bio-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/cropped-andy-oram-bio-96x96.jpg\",\"caption\":\"Andrew Oram\"},\"description\":\"Andy is a writer and editor in the computer field. His editorial projects at O'Reilly Media ranged from a legal guide covering intellectual property to a graphic novel about teenage hackers. Andy also writes often on health IT, on policy issues related to the Internet, and on trends affecting technical innovation and its effects on society. Print publications where his work has appeared include The Economist, Communications of the ACM, Copyright World, the Journal of Information Technology &amp; Politics, Vanguardia Dossier, and Internet Law and Business. Conferences where he has presented talks include O'Reilly's Open Source Convention, FISL (Brazil), FOSDEM (Brussels), DebConf, and LibrePlanet. Andy participates in the Association for Computing Machinery's policy organization, USTPC.\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Open Source Myth: That Intruders Can More Easily Find Flaws - Linux Professional Institute (LPI)","description":"This myth is often spread. But why are modern security tools (such as the encryption methods used to send data securely over the Web) open source?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.lpi.org\/es\/blog\/2023\/02\/28\/open-source-myth-intruders-can-more-easily-find-flaws\/","og_locale":"es_ES","og_type":"article","og_title":"Open Source Myth: That Intruders Can More Easily Find Flaws","og_description":"This myth is often spread. But why are modern security tools (such as the encryption methods used to send data securely over the Web) open source?","og_url":"https:\/\/www.lpi.org\/es\/blog\/2023\/02\/28\/open-source-myth-intruders-can-more-easily-find-flaws\/","og_site_name":"Linux Professional Institute (LPI)","article_publisher":"https:\/\/www.facebook.com\/LPIConnect","article_published_time":"2023-02-28T13:54:21+00:00","article_modified_time":"2023-07-31T12:32:01+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/www.lpi.org\/wp-content\/uploads\/2023\/02\/tw-li-fb-Open-Source-Myths-EP4.png","type":"image\/png"}],"author":"Andrew Oram","twitter_card":"summary_large_image","twitter_creator":"@lpiconnect","twitter_site":"@lpiconnect","twitter_misc":{"Escrito por":"Andrew Oram","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.lpi.org\/es\/blog\/2023\/02\/28\/open-source-myth-intruders-can-more-easily-find-flaws\/#article","isPartOf":{"@id":"https:\/\/www.lpi.org\/es\/blog\/2023\/02\/28\/open-source-myth-intruders-can-more-easily-find-flaws\/"},"author":{"name":"Andrew Oram","@id":"https:\/\/www.lpi.org\/es\/#\/schema\/person\/3406dc82718aebf8c9e647fe3a54116a"},"headline":"Open Source Myth: That Intruders Can More Easily Find Flaws","datePublished":"2023-02-28T13:54:21+00:00","dateModified":"2023-07-31T12:32:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.lpi.org\/es\/blog\/2023\/02\/28\/open-source-myth-intruders-can-more-easily-find-flaws\/"},"wordCount":335,"commentCount":0,"publisher":{"@id":"https:\/\/www.lpi.org\/es\/#organization"},"image":{"@id":"https:\/\/www.lpi.org\/es\/blog\/2023\/02\/28\/open-source-myth-intruders-can-more-easily-find-flaws\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lpi.org\/wp-content\/uploads\/2023\/05\/article-Open-Source-Myths-EP4.jpg","articleSection":["Sin categorizar"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.lpi.org\/es\/blog\/2023\/02\/28\/open-source-myth-intruders-can-more-easily-find-flaws\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.lpi.org\/es\/blog\/2023\/02\/28\/open-source-myth-intruders-can-more-easily-find-flaws\/","url":"https:\/\/www.lpi.org\/es\/blog\/2023\/02\/28\/open-source-myth-intruders-can-more-easily-find-flaws\/","name":"Open Source Myth: That Intruders Can More Easily Find Flaws - Linux Professional Institute (LPI)","isPartOf":{"@id":"https:\/\/www.lpi.org\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.lpi.org\/es\/blog\/2023\/02\/28\/open-source-myth-intruders-can-more-easily-find-flaws\/#primaryimage"},"image":{"@id":"https:\/\/www.lpi.org\/es\/blog\/2023\/02\/28\/open-source-myth-intruders-can-more-easily-find-flaws\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lpi.org\/wp-content\/uploads\/2023\/05\/article-Open-Source-Myths-EP4.jpg","datePublished":"2023-02-28T13:54:21+00:00","dateModified":"2023-07-31T12:32:01+00:00","description":"This myth is often spread. But why are modern security tools (such as the encryption methods used to send data securely over the Web) open source?","breadcrumb":{"@id":"https:\/\/www.lpi.org\/es\/blog\/2023\/02\/28\/open-source-myth-intruders-can-more-easily-find-flaws\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.lpi.org\/es\/blog\/2023\/02\/28\/open-source-myth-intruders-can-more-easily-find-flaws\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.lpi.org\/es\/blog\/2023\/02\/28\/open-source-myth-intruders-can-more-easily-find-flaws\/#primaryimage","url":"https:\/\/www.lpi.org\/wp-content\/uploads\/2023\/05\/article-Open-Source-Myths-EP4.jpg","contentUrl":"https:\/\/www.lpi.org\/wp-content\/uploads\/2023\/05\/article-Open-Source-Myths-EP4.jpg","width":1440,"height":994},{"@type":"BreadcrumbList","@id":"https:\/\/www.lpi.org\/es\/blog\/2023\/02\/28\/open-source-myth-intruders-can-more-easily-find-flaws\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.lpi.org\/es\/"},{"@type":"ListItem","position":2,"name":"Open Source Myth: That Intruders Can More Easily Find Flaws"}]},{"@type":"WebSite","@id":"https:\/\/www.lpi.org\/es\/#website","url":"https:\/\/www.lpi.org\/es\/","name":"Linux Professional Institute (LPI)","description":"","publisher":{"@id":"https:\/\/www.lpi.org\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.lpi.org\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.lpi.org\/es\/#organization","name":"Linux Professional Institute (LPI)","url":"https:\/\/www.lpi.org\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.lpi.org\/es\/#\/schema\/logo\/image\/","url":"https:\/\/www.lpi.org\/wp-content\/uploads\/2023\/04\/logo.png","contentUrl":"https:\/\/www.lpi.org\/wp-content\/uploads\/2023\/04\/logo.png","width":496,"height":175,"caption":"Linux Professional Institute (LPI)"},"image":{"@id":"https:\/\/www.lpi.org\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/LPIConnect","https:\/\/x.com\/lpiconnect","https:\/\/www.linkedin.com\/company\/35136","https:\/\/www.instagram.com\/lpi_org\/","https:\/\/fosstodon.org\/@LPI"]},{"@type":"Person","@id":"https:\/\/www.lpi.org\/es\/#\/schema\/person\/3406dc82718aebf8c9e647fe3a54116a","name":"Andrew Oram","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.lpi.org\/wp-content\/uploads\/2023\/07\/cropped-andy-oram-bio-96x96.jpgdbb3f146554e46589556139ade4d760d","url":"https:\/\/www.lpi.org\/wp-content\/uploads\/2023\/07\/cropped-andy-oram-bio-96x96.jpg","contentUrl":"https:\/\/www.lpi.org\/wp-content\/uploads\/2023\/07\/cropped-andy-oram-bio-96x96.jpg","caption":"Andrew Oram"},"description":"Andy is a writer and editor in the computer field. His editorial projects at O'Reilly Media ranged from a legal guide covering intellectual property to a graphic novel about teenage hackers. Andy also writes often on health IT, on policy issues related to the Internet, and on trends affecting technical innovation and its effects on society. Print publications where his work has appeared include The Economist, Communications of the ACM, Copyright World, the Journal of Information Technology &amp; Politics, Vanguardia Dossier, and Internet Law and Business. Conferences where he has presented talks include O'Reilly's Open Source Convention, FISL (Brazil), FOSDEM (Brussels), DebConf, and LibrePlanet. Andy participates in the Association for Computing Machinery's policy organization, USTPC."}]}},"views":660,"authors":[{"term_id":495,"user_id":44,"is_guest":0,"slug":"aoramexample-com","display_name":"Andrew Oram","avatar_url":"https:\/\/www.lpi.org\/wp-content\/uploads\/2023\/07\/cropped-andy-oram-bio-96x96.jpg","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.lpi.org\/es\/wp-json\/wp\/v2\/posts\/4187","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lpi.org\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lpi.org\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lpi.org\/es\/wp-json\/wp\/v2\/users\/44"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lpi.org\/es\/wp-json\/wp\/v2\/comments?post=4187"}],"version-history":[{"count":3,"href":"https:\/\/www.lpi.org\/es\/wp-json\/wp\/v2\/posts\/4187\/revisions"}],"predecessor-version":[{"id":16522,"href":"https:\/\/www.lpi.org\/es\/wp-json\/wp\/v2\/posts\/4187\/revisions\/16522"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lpi.org\/es\/wp-json\/wp\/v2\/media\/3455"}],"wp:attachment":[{"href":"https:\/\/www.lpi.org\/es\/wp-json\/wp\/v2\/media?parent=4187"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lpi.org\/es\/wp-json\/wp\/v2\/categories?post=4187"},{"taxonomy":"country","embeddable":true,"href":"https:\/\/www.lpi.org\/es\/wp-json\/wp\/v2\/country?post=4187"},{"taxonomy":"language","embeddable":true,"href":"https:\/\/www.lpi.org\/es\/wp-json\/wp\/v2\/language?post=4187"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.lpi.org\/es\/wp-json\/wp\/v2\/ppma_author?post=4187"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}