{"id":53226,"date":"2024-04-24T11:45:14","date_gmt":"2024-04-24T10:45:14","guid":{"rendered":"https:\/\/commons.ngi.eu\/?p=53226"},"modified":"2024-05-07T07:36:32","modified_gmt":"2024-05-07T06:36:32","slug":"responding-to-xz-utils-can-a-digital-commons-approach-reinforce-oss-security","status":"publish","type":"post","link":"https:\/\/commons.ngi.eu\/2024\/04\/24\/responding-to-xz-utils-can-a-digital-commons-approach-reinforce-oss-security\/","title":{"rendered":"<p>R\u00e9ponse \u00e0 XZ utils: Une approche num\u00e9rique commune peut-elle renforcer la s\u00e9curit\u00e9 du guichet unique?<\/p>"},"content":{"rendered":"<p><em>Ce qui suit est un blog d\u2019opinion de membres du consortium NGI Commons (Nicholas Gates, d\u2019OpenForum Europe, et Jan Krewer, d\u2019Open Future) concernant l\u2019exposition r\u00e9cente de la porte d\u00e9rob\u00e9e des outils XZ. Si vous souhaitez donner votre avis, veuillez <\/em><a href=\"https:\/\/commons.ngi.eu\/fr\/contacts\/\"><em>prenez contact avec vous<\/em><\/a><em> avec nous par l\u2019interm\u00e9diaire du site web.<\/em><p>L\u2019exposition r\u00e9cente du <a href=\"https:\/\/arstechnica.com\/security\/2024\/04\/what-we-know-about-the-xz-utils-backdoor-that-almost-infected-the-world\/\" target=\"_blank\" rel=\"noreferrer noopener\">Porte d\u00e9rob\u00e9e des outils XZ<\/a> a rattrap\u00e9 les communaut\u00e9s du code source ouvert et de la cybers\u00e9curit\u00e9. Alors qu\u2019elle a (une fois de plus) d\u00e9montr\u00e9 l\u2019importance <a href=\"https:\/\/www.theregister.com\/2024\/04\/21\/microsoft_national_security_risk\/\" target=\"_blank\" rel=\"noreferrer noopener\">avantages<\/a> de logiciels libres du point de vue de la s\u00e9curit\u00e9 par rapport aux logiciels propri\u00e9taires? compte tenu du fait que le d\u00e9faut a \u00e9t\u00e9 d\u00e9couvert relativement rapidement <em>et <\/em>que la communaut\u00e9 ait \u00e9t\u00e9 en mesure de r\u00e9agir aussi rapidement en partageant des informations et en prenant des mesures? Elle a \u00e9galement mis en \u00e9vidence les limites d\u2019un syst\u00e8me qui doit largement s\u2019appuyer sur les efforts des volontaires.<\/p><p>Un nombre croissant d\u2019experts <a href=\"https:\/\/openssf.org\/blog\/2024\/04\/15\/open-source-security-openssf-and-openjs-foundations-issue-alert-for-social-engineering-takeovers-of-open-source-projects\/\" target=\"_blank\" rel=\"noreferrer noopener\">argumenter<\/a> qu\u2019il convient de rem\u00e9dier \u00e0 ces limitations au moyen d\u2019un soutien public accru, notamment: <a href=\"https:\/\/matrix.org\/blog\/2024\/04\/open-source-publicly-funded-service\/\" target=\"_blank\" rel=\"noreferrer noopener\">financement public<\/a>. Dans le m\u00eame temps, il est essentiel de pr\u00e9server et de renforcer les fondamentaux sur lesquels reposent la plupart des projets open source: collaboration, libert\u00e9 d\u2019utilisation, normalisation de l\u2019utilisation, etc. Nous estimons donc qu\u2019une gouvernance plus intentionnelle des principaux logiciels libres est utilis\u00e9e en tant que <a href=\"https:\/\/openfuture.eu\/blog\/french-presidency-report-digital-commons-are-key-to-europes-digital-sovereignty\/\" target=\"_blank\" rel=\"noreferrer noopener\">biens communs num\u00e9riques<\/a> dans les infrastructures de s\u00e9curit\u00e9, les probl\u00e8mes que nous avons rencontr\u00e9s dans l\u2019affaire XZ utils pourraient contribuer \u00e0 codifier les normes communautaires et \u00e0 surmonter le probl\u00e8me de l\u2019\u00e9puisement professionnel.<\/p><h3 class=\"wp-block-heading\" id=\"h-what-happened-with-the-xz-utils-backdoor\">Qu\u2019est-il advenu de la porte d\u00e9rob\u00e9e des outils XZ?<\/h3><p>XZ utils est un service de compression de donn\u00e9es, largement utilis\u00e9 dans de nombreuses distributions GNU\/Linux. Il s\u2019agissait <a href=\"https:\/\/openssf.org\/blog\/2024\/03\/30\/xz-backdoor-cve-2024-3094\/\" target=\"_blank\" rel=\"noreferrer noopener\">trouv\u00e9<\/a> pour qu\u2019une porte d\u00e9rob\u00e9e y soit plac\u00e9e par un mainteneur, ce que l\u2019on appelle <em>Jia Tan<\/em>, qui <a href=\"https:\/\/www.wired.com\/story\/jia-tan-xz-backdoor\/\" target=\"_blank\" rel=\"noreferrer noopener\">confiance acquise<\/a> dans la communaut\u00e9, maintenir XZ utils pendant des ann\u00e9es tout en agissant (pr\u00e9tendument) pour le compte d\u2019un organisme soutenu par l\u2019\u00c9tat. Jia Tan? s subterfuge? qui a \u00e9t\u00e9 prochainement fix\u00e9 \u00e0 de nombreuses distributions de Linux? <a href=\"https:\/\/www.nytimes.com\/2024\/04\/03\/technology\/prevent-cyberattack-linux.html\" target=\"_blank\" rel=\"noreferrer noopener\">d\u00e9couvert<\/a> ce n\u2019est qu\u2019en menant une enqu\u00eate minutieuse sur un d\u00e9veloppeur isol\u00e9 PostgresSQL et membre de la communaut\u00e9 de la s\u00e9curit\u00e9 d\u2019Openwall, Andres Freund.<\/p><figure class=\"wp-block-image alignright size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/commons.ngi.eu\/wp-content\/uploads\/2024\/04\/pexels-sora-shimazaki-5935794-1-1024x683.jpg\" alt=\"R\u00e9ponse \u00e0 XZ utils: Une approche num\u00e9rique commune peut-elle renforcer la s\u00e9curit\u00e9 du guichet unique?\" class=\"wp-image-53227\" style=\"width:415px;height:auto\" srcset=\"https:\/\/commons.ngi.eu\/wp-content\/uploads\/2024\/04\/pexels-sora-shimazaki-5935794-1-1024x683.jpg 1024w, https:\/\/commons.ngi.eu\/wp-content\/uploads\/2024\/04\/pexels-sora-shimazaki-5935794-1-300x200.jpg 300w, https:\/\/commons.ngi.eu\/wp-content\/uploads\/2024\/04\/pexels-sora-shimazaki-5935794-1-768x512.jpg 768w, https:\/\/commons.ngi.eu\/wp-content\/uploads\/2024\/04\/pexels-sora-shimazaki-5935794-1-1536x1024.jpg 1536w, https:\/\/commons.ngi.eu\/wp-content\/uploads\/2024\/04\/pexels-sora-shimazaki-5935794-1-2048x1365.jpg 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\"><\/figure><p>En tant que <a href=\"https:\/\/web.archive.org\/web\/20240404000115\/https:\/\/www.nytimes.com\/2024\/04\/03\/technology\/prevent-cyberattack-linux.html\" target=\"_blank\" rel=\"noreferrer noopener\">commentaire d\u2019Alex Stamos<\/a> il a \u00e9t\u00e9 not\u00e9 que si XZ utils avait \u00e9t\u00e9 int\u00e9gr\u00e9 dans les distributions Linux mondiales, il aurait pu s\u2019agir: \u00ab[...] la porte d\u00e9rob\u00e9e la plus r\u00e9pandue et la plus efficace jamais install\u00e9e dans n\u2019importe quel produit logiciel\u00bb et aurait pu \u00abdonner \u00e0 ses cr\u00e9ateurs une cl\u00e9 ma\u00eetresse pour [...] des centaines de millions d\u2019ordinateurs dans le monde entier\u00bb. Ce potentiel? surveillance? dans le code aurait eu de vastes cons\u00e9quences sur la cybers\u00e9curit\u00e9, la souverainet\u00e9 num\u00e9rique et la s\u00e9curit\u00e9 nationale \u00e0 l\u2019\u00e9chelle mondiale.<\/p><p>Bien que les fondamentaux de la gouvernance du guichet unique restent largement incontest\u00e9s par cette affaire et se soient r\u00e9v\u00e9l\u00e9s dignes de conservation, des rapports sur <a href=\"https:\/\/robmensching.com\/blog\/posts\/2024\/03\/30\/a-microcosm-of-the-interactions-in-open-source-projects\/\" target=\"_blank\" rel=\"noreferrer noopener\">interactions \u00e0 l\u2019origine de l\u2019introduction de la vuln\u00e9rabilit\u00e9<\/a> dans l\u2019utilit\u00e9 XZ, indiquer les limites du mod\u00e8le mainteneur. De nombreux maintenants manquent de ressources et de temps pour soutenir leurs projets autant qu\u2019ils en ont besoin, ce qui entra\u00eene souvent du stress et des burnouts. Pour beaucoup, ces informations rappelleront les c\u00e9l\u00e8bres <a href=\"https:\/\/web.archive.org\/web\/20240404011038\/https:\/\/xkcd.com\/2347\/\" target=\"_blank\" rel=\"noreferrer noopener\">m\u00e9moire sur les infrastructures num\u00e9riques modernes<\/a>, qui constate que les grandes infrastructures sont souvent tributaires du travail \u00e0 petite \u00e9chelle d\u2019une poign\u00e9e de b\u00e9n\u00e9voles, ce qui n\u00e9cessite <a href=\"https:\/\/dfrlab.org\/2024\/04\/18\/more-money-better-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">davantage de financements<\/a> am\u00e9liorer les pratiques de s\u00e9curit\u00e9 \u00e0 grande \u00e9chelle.<\/p><h3 class=\"wp-block-heading\" id=\"h-why-does-that-matter\"><strong>Pourquoi est-ce important?<\/strong><\/h3><p>Lorsque l\u2019on r\u00e9fl\u00e9chit \u00e0 la mani\u00e8re dont les communaut\u00e9s de guichet unique sont organis\u00e9es, il est important de garder \u00e0 l\u2019esprit que l\u2019\u00e9cosyst\u00e8me du guichet unique est devenu de plus en plus vaste et complexe. Environ 96% du code commercial contient un code source ouvert et 76% du code en g\u00e9n\u00e9ral est open source, selon le <a href=\"https:\/\/www.synopsys.com\/blogs\/software-security\/deep-dive-2023-ossra-report.html\" target=\"_blank\" rel=\"noreferrer noopener\">Rapport OSSRA 2023<\/a>. L\u2019existence de fondations priv\u00e9es et d\u2019un grand nombre de grandes entreprises technologiques contribuant \u00e0 la fourniture du guichet unique au moyen de financements ou de contributions directes a continu\u00e9 d\u2019augmenter ces derni\u00e8res ann\u00e9es.<\/p><p>Cela \u00e9tant dit, il peut \u00eatre difficile de cartographier tout ce qui est utilis\u00e9 en premier lieu dans le cadre des infrastructures de s\u00e9curit\u00e9. Il y a m\u00eame<em> <\/em>solutions innovantes pour en suivre un, en s\u2019appuyant sur certains logiciels libres pour contribuer \u00e0 la maintenance de composants cl\u00e9s dans une cha\u00eene de valeur (par exemple: <a href=\"https:\/\/www.drips.network\/\" target=\"_blank\" rel=\"noreferrer noopener\">Purgeurs<\/a>, <a href=\"https:\/\/fossfunders.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">FossFunders (Fonds de financement)<\/a>, <a href=\"https:\/\/github.com\/sponsors\" target=\"_blank\" rel=\"noreferrer noopener\">Promoteurs de GitHub<\/a>, etc), mais il s\u2019agit souvent de solutions imparfaites au mieux.<\/p><p>En outre, ces efforts semblent insuffisants pour r\u00e9soudre le probl\u00e8me fondamental de la p\u00e9nurie d\u2019entretien (par exemple, ressources et attention) sur le terrain. L\u2019ampleur actuelle du d\u00e9veloppement de logiciels libres n\u00e9cessite: <em>en savoir plus <\/em>engagement public et financement public, pas une confiance incontest\u00e9e dans les meilleurs membres de la communaut\u00e9 open source pour garantir sa s\u00e9curit\u00e9. Des prescriptions sp\u00e9cifiques doivent \u00eatre pr\u00e9vues pour renforcer la gouvernance du guichet unique et contribuer \u00e0 surmonter les difficult\u00e9s li\u00e9es \u00e0 la poursuite de l\u2019engagement et \u00e0 l\u2019\u00e9puisement professionnel.<\/p><p>Ces observations ont donn\u00e9 lieu \u00e0 plusieurs <a href=\"https:\/\/www.atlanticcouncil.org\/in-depth-research-reports\/report\/open-source-software-as-infrastructure\/\" target=\"_blank\" rel=\"noreferrer noopener\">demande un renforcement de la responsabilit\u00e9 collective et des investissements publics<\/a> dans la r\u00e9gion, \u00e0 l\u2019instar de ce que <a href=\"https:\/\/www.sovereigntechfund.de\/\" target=\"_blank\" rel=\"noreferrer noopener\">Fonds souverain pour les technologies<\/a> c\u2019est le cas en Allemagne. Il y a \u00e9galement eu <a href=\"https:\/\/ukdayone.org\/briefings\/a-uk-open-source-fund\" target=\"_blank\" rel=\"noreferrer noopener\">appels r\u00e9cents au Royaume-Uni<\/a>, par exemple. L\u2019objectif de ces efforts serait de recenser et de soutenir les composants logiciels essentiels du point de vue de l\u2019int\u00e9r\u00eat public g\u00e9n\u00e9ral, tels que la cybers\u00e9curit\u00e9, la souverainet\u00e9, la d\u00e9pendance industrielle, les services publics ou la r\u00e9silience globale de la pile internet.<\/p><style>.wp-block-kadence-advancedheading.kt-adv-heading53226_91f911-65, .wp-block-kadence-advancedheading.kt-adv-heading53226_91f911-65[data-kb-block=\"kb-adv-heading53226_91f911-65\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading53226_91f911-65 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading53226_91f911-65[data-kb-block=\"kb-adv-heading53226_91f911-65\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading53226_91f911-65 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading53226_91f911-65[data-kb-block=\"kb-adv-heading53226_91f911-65\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style><h3 class=\"kt-adv-heading53226_91f911-65 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading53226_91f911-65\">Une approche num\u00e9rique commune pour renforcer la s\u00e9curit\u00e9 du guichet unique<\/h3><p>La s\u00e9curit\u00e9 des logiciels libres est en partie rendue possible par ce qui a \u00e9t\u00e9 invent\u00e9 comme suit: <a href=\"https:\/\/opensource.com\/article\/21\/2\/open-source-security\" target=\"_blank\" rel=\"noreferrer noopener\">Linus? droit<\/a> ? l\u2019id\u00e9e que, compte tenu du nombre suffisant de boules de sourcils, tous les bugs sont peu profonds? Cette loi? au moins en tant qu\u2019adage, si <a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3364641.3364650\" target=\"_blank\" rel=\"noreferrer noopener\">il ne s\u2019agit pas uniquement de sciences sociales<\/a> ? cela reste vrai, \u00e9tant donn\u00e9 que c\u2019est l\u2019ouverture des outils XZ qui a permis \u00e0 Freund de d\u00e9couvrir et d\u2019exposer la porte d\u00e9rob\u00e9e.<\/p><p>Toutefois, nous notons \u00e9galement que cet exemple montre que la s\u00e9curit\u00e9 du guichet unique d\u00e9pend \u00e9galement en grande partie de la sant\u00e9 des communaut\u00e9s qui sont de plus en plus br\u00fbl\u00e9es et susceptibles d\u2019\u00eatre exploit\u00e9es \u00e0 des fins malveillantes. Ces capacit\u00e9s n\u00e9cessitent plus que de simples lunettes ou des comp\u00e9tences suppl\u00e9mentaires en mati\u00e8re de d\u00e9veloppement de logiciels.<\/p><p>Selon Tobie Langel, il s\u2019agit de <a href=\"https:\/\/speaking.unlockopen.com\/nBXJS5\/1-billion-dollars-for-open-source-maintainers\" target=\"_blank\" rel=\"noreferrer noopener\">probl\u00e8me principal<\/a> aujourd\u2019hui: nous ne reconnaissons pas le r\u00f4le distinct des responsables de la maintenance open source. On suppose que le d\u00e9veloppement de logiciels open source consiste uniquement \u00e0 d\u00e9velopper de nouveaux codes et \u00e0 ajouter de nouvelles fonctionnalit\u00e9s. Les discussions sur la s\u00e9curit\u00e9 des logiciels libres n\u00e9cessitent des solutions de base pour rem\u00e9dier aux vuln\u00e9rabilit\u00e9s potentielles dans le d\u00e9veloppement d\u00e9centralis\u00e9 des logiciels, y compris <a href=\"https:\/\/openjsf.org\/blog\/openssf-openjs-alert-social-engineering-takeovers\" target=\"_blank\" rel=\"noreferrer noopener\">menace de l\u2019ing\u00e9nierie sociale<\/a>.<\/p><p>Les d\u00e9bats d\u2019orientation sur la cybers\u00e9curit\u00e9 du guichet unique devraient \u00e9galement tenir compte des diff\u00e9rences critiques dans l\u2019organisation et la gouvernance qui sous-tendent un projet de guichet unique. La gouvernance des trains de mesures relevant du guichet unique diff\u00e8re consid\u00e9rablement, allant de fondations gigantesques comptant de vastes communaut\u00e9s telles que la Fondation Apache \u00e0 des projets informels de moindre envergure collaborant sur des outils sp\u00e9cifiques sur Github.<\/p><p>Afin de mieux comprendre la diversit\u00e9 des r\u00e9alit\u00e9s sociales entre les projets open source, un <a href=\"https:\/\/www.diplomatie.gouv.fr\/IMG\/pdf\/report_of_the_european_working_team_on_digital_commons_digital_assembly_june_2022_wnetherlands_cle843dbf.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">le concept de biens communs num\u00e9riques fait l\u2019objet d\u2019une attention croissante<\/a>. Les biens communs num\u00e9riques sont les suivants: <a href=\"https:\/\/openfuture.eu\/blog\/french-presidency-report-digital-commons-are-key-to-europes-digital-sovereignty\/\" target=\"_blank\" rel=\"noreferrer noopener\">d\u00e9fini en commun<\/a> AS? ressources non rivales et non exclusives d\u00e9finies par la production distribu\u00e9e et commune, la propri\u00e9t\u00e9 et la gouvernance des capacit\u00e9s et technologies d\u2019information. Ce concept est utilis\u00e9 non seulement pour d\u00e9crire les ressources avec des licences d\u2019acc\u00e8s non exclusives, mais aussi les ressources qui sont effectivement g\u00e9r\u00e9es par une communaut\u00e9 qui s\u2019organise elle-m\u00eame pour d\u00e9finir sa gouvernance ainsi que les droits d\u2019acc\u00e8s et d\u2019utilisation.<\/p><p>Nous soutenons que le fait de penser plus intentionnellement \u00e0 des trains de mesures sp\u00e9cifiques en mati\u00e8re de guichet unique et \u00e0 leurs communaut\u00e9s en tant que biens communs num\u00e9riques et de codifier des r\u00e8gles et des normes plus strictes pour leur gouvernance pourrait contribuer \u00e0 surmonter l\u2019exploitation potentielle du mod\u00e8le de mainteneur, en cr\u00e9ant davantage de possibilit\u00e9s d\u2019\u00e9quilibre des pouvoirs. Les projets relevant du guichet unique qui sont auto-organis\u00e9s mais disposent de r\u00e8gles et de mod\u00e8les de gouvernance bien \u00e9tablis peuvent r\u00e9duire les d\u00e9pendances uniques gr\u00e2ce \u00e0 la production distribu\u00e9e.&nbsp;<\/p><p>C\u2019est bien s\u00fbr difficile, quand on ne sait pas exactement qui utilise quoi, ou quand certains colis n\u2019ont rien qui ressemble \u00e0 une communaut\u00e9, \u00e0 une seule personne. Toutefois, nous soutenons qu\u2019il est essentiel d\u2019ajouter une d\u00e9finition ou une structure plus large aux mod\u00e8les de gouvernance du guichet unique pour continuer \u00e0 soutenir les communaut\u00e9s qui font le travail acharn\u00e9 de maintenance. \u00c0 elles seules, les ressources logicielles sont diff\u00e9rentes de celles qui sont soutenues par des communaut\u00e9s dynamiques, et elles n\u00e9cessitent que les personnes se r\u00e9unissent d\u2019une mani\u00e8re plus d\u00e9finie pour codifier les r\u00e8gles et renforcer la responsabilit\u00e9 partag\u00e9e en ce qui concerne leur durabilit\u00e9 \u00e0 long terme.<\/p><p>Continuer \u00e0 promouvoir des m\u00e9canismes de gouvernance solides gr\u00e2ce \u00e0 davantage de ressources et <em>attention <\/em>devrait conduire \u00e0 des obligations partag\u00e9es en mati\u00e8re d\u2019entretien face \u00e0 la menace de l\u2019ing\u00e9nierie sociale. Cela \u00e9tant, elle n\u00e9cessite un soutien public, ainsi que la maturit\u00e9 (et les besoins) des communaut\u00e9s de maintenants. <a href=\"https:\/\/dfrlab.org\/2024\/04\/18\/more-money-better-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">doit \u00eatre pris en compte<\/a> par les industries et les gouvernements qui d\u00e9pendent du guichet unique.<\/p><p>Mais comment aller dans le sens de cette r\u00e9alit\u00e9?<\/p><h3 class=\"wp-block-heading\" id=\"h-the-role-of-the-public-sector\">Le r\u00f4le du secteur public<\/h3><p>La majorit\u00e9 des politiques relatives \u00e0 la technologie en g\u00e9n\u00e9ral associent le d\u00e9veloppement de logiciels principalement \u00e0 l\u2019innovation, plut\u00f4t qu\u2019\u00e0 la maintenance. Ce n\u2019est que r\u00e9cemment que les conversations ont commenc\u00e9 \u00e0 se concentrer davantage sur la mani\u00e8re de prendre en charge les infrastructures existantes et leur s\u00e9curit\u00e9. Les responsables de l\u2019entretien des guichets uniques \u00abburnout\u00bb nous montrent que cela doit changer encore plus rapidement, et ce qui s\u2019est pass\u00e9 avec XZ utils est un nouveau rappel.<\/p><p>Les fondations existantes pourraient bient\u00f4t commencer \u00e0 s\u2019orienter davantage vers la s\u00e9paration des activit\u00e9s li\u00e9es \u00e0 la maintenance, au conseil juridique, \u00e0 la cr\u00e9ation de communaut\u00e9s ou \u00e0 la communication du d\u00e9veloppement de logiciels. Des solutions innovantes pour identifier les d\u00e9pendances et <a href=\"https:\/\/joinup.ec.europa.eu\/collection\/fosseps\/news\/fosseps-project-launched\" target=\"_blank\" rel=\"noreferrer noopener\">tentatives actuelles<\/a> pour mieux d\u00e9finir les composantes du guichet unique qui devraient \u00eatre consid\u00e9r\u00e9es comme des infrastructures, il est tr\u00e8s encourageant d\u2019aider les chercheurs \u00e0 d\u00e9terminer ce qui n\u00e9cessite un soutien en premier lieu.<\/p><p>Une fois identifi\u00e9s, nous ne devons pas oublier le r\u00f4le du financement public dans le soutien aux biens communs num\u00e9riques open source. Par exemple, le <a href=\"https:\/\/arxiv.org\/abs\/2404.06484\" target=\"_blank\" rel=\"noreferrer noopener\">exp\u00e9rience<\/a> le financement du scikit-learn par le gouvernement fran\u00e7ais souligne l\u2019importance de financer la maintenance du guichet unique existant, tel que le scikit-learn, qui est utilis\u00e9 quotidiennement par des millions de chercheurs et d\u2019ing\u00e9nieurs, plut\u00f4t que de financer simplement le d\u00e9veloppement de nouvelles fonctionnalit\u00e9s ou de nouveaux outils.<\/p><p>Lorsqu\u2019elles sont combin\u00e9es \u00e0 des initiatives de changement <em>comment? <\/em>les biens communs num\u00e9riques b\u00e9n\u00e9ficient d\u2019un soutien public, que ce soit au moyen d\u2019un financement \u00e0 long terme ou de mesures de renforcement des capacit\u00e9s, et nous voyons la possibilit\u00e9 de cr\u00e9er davantage de participation dans les communaut\u00e9s open source pour les progiciels cl\u00e9s pour la cybers\u00e9curit\u00e9, en particulier ceux utilis\u00e9s dans les distributions Linux (sur lesquelles de nombreuses infrastructures de cybers\u00e9curit\u00e9 fonctionnent).&nbsp;<\/p><p>Le projet NGI Commons participera activement \u00e0 ces efforts en essayant d\u2019imaginer un paysage europ\u00e9en de financement public et priv\u00e9 plus coh\u00e9rent pour les ressources qui sont essentielles pour la souverainet\u00e9 num\u00e9rique de l\u2019Europe \u00e0 l\u2019avenir. Le projet dialoguera avec les communaut\u00e9s de biens communs num\u00e9riques afin de mieux cerner leurs besoins et les lacunes actuelles dans les initiatives strat\u00e9giques visant \u00e0 soutenir leur d\u00e9veloppement. En outre, compte tenu de l\u2019utilisation g\u00e9n\u00e9ralis\u00e9e et de l\u2019omnipr\u00e9sence des biens communs num\u00e9riques dans nos soci\u00e9t\u00e9s, nous estimons que ces questions doivent \u00eatre pleinement int\u00e9gr\u00e9es dans les travaux de la Commission europ\u00e9enne, en particulier dans le contexte des n\u00e9gociations relatives au prochain cadre financier pluriannuel (CFP) de l\u2019UE.<\/p><\/p>","protected":false},"excerpt":{"rendered":"<p>La r\u00e9cente exposition des utils XZ \u00e0 la porte d\u00e9rob\u00e9e a raviv\u00e9 les communaut\u00e9s du code source ouvert et de la cybers\u00e9curit\u00e9. Alors que c\u2019est (encore une fois)...<\/p>","protected":false},"author":2,"featured_media":53227,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_tec_requires_first_save":true,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_EventAllDay":false,"_EventTimezone":"","_EventStartDate":"","_EventEndDate":"","_EventStartDateUTC":"","_EventEndDateUTC":"","_EventShowMap":false,"_EventShowMapLink":false,"_EventURL":"","_EventCost":"","_EventCostDescription":"","_EventCurrencySymbol":"","_EventCurrencyCode":"","_EventCurrencyPosition":"","_EventDateTimeSeparator":"","_EventTimeRangeSeparator":"","_EventOrganizerID":[],"_EventVenueID":[],"_OrganizerEmail":"","_OrganizerPhone":"","_OrganizerWebsite":"","_VenueAddress":"","_VenueCity":"","_VenueCountry":"","_VenueProvince":"","_VenueState":"","_VenueZip":"","_VenuePhone":"","_VenueURL":"","_VenueStateProvince":"","_VenueLat":"","_VenueLng":"","_VenueShowMap":false,"_VenueShowMapLink":false,"_tribe_blocks_recurrence_rules":"","_tribe_blocks_recurrence_description":"","_tribe_blocks_recurrence_exclusions":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[1],"tags":[583,582,584],"class_list":["post-53226","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-open-future","tag-openforum-europe","tag-oss-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Responding to XZ utils: Can a digital commons approach reinforce OSS security? - NGI Commons<\/title>\n<meta name=\"description\" content=\"The recent exposure of the XZ utils backdoor rattled the open source and cybersecurity communities.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/commons.ngi.eu\/fr\/2024\/04\/24\/responding-to-xz-utils-can-a-digital-commons-approach-reinforce-oss-security\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Responding to XZ utils: Can a digital commons approach reinforce OSS security? - NGI Commons\" \/>\n<meta property=\"og:description\" content=\"The recent exposure of the XZ utils backdoor rattled the open source and cybersecurity communities.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/commons.ngi.eu\/fr\/2024\/04\/24\/responding-to-xz-utils-can-a-digital-commons-approach-reinforce-oss-security\/\" \/>\n<meta property=\"og:site_name\" content=\"NGI Commons\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-24T10:45:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-07T06:36:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/commons.ngi.eu\/wp-content\/uploads\/2024\/04\/pexels-sora-shimazaki-5935794-1-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"margfmartel16\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@NGICommons\" \/>\n<meta name=\"twitter:site\" content=\"@NGICommons\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"margfmartel16\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/commons.ngi.eu\/2024\/04\/24\/responding-to-xz-utils-can-a-digital-commons-approach-reinforce-oss-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/commons.ngi.eu\/2024\/04\/24\/responding-to-xz-utils-can-a-digital-commons-approach-reinforce-oss-security\/\"},\"author\":{\"name\":\"margfmartel16\",\"@id\":\"https:\/\/commons.ngi.eu\/fr\/#\/schema\/person\/a03a49ec036860ed92a3c7af6fb33c68\"},\"headline\":\"Responding to XZ utils: Can a digital commons approach reinforce OSS security?\",\"datePublished\":\"2024-04-24T10:45:14+00:00\",\"dateModified\":\"2024-05-07T06:36:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/commons.ngi.eu\/2024\/04\/24\/responding-to-xz-utils-can-a-digital-commons-approach-reinforce-oss-security\/\"},\"wordCount\":1672,\"publisher\":{\"@id\":\"https:\/\/commons.ngi.eu\/fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/commons.ngi.eu\/2024\/04\/24\/responding-to-xz-utils-can-a-digital-commons-approach-reinforce-oss-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/commons.ngi.eu\/wp-content\/uploads\/2024\/04\/pexels-sora-shimazaki-5935794-1-scaled.jpg\",\"keywords\":[\"Open Future\",\"OpenForum Europe\",\"OSS security\"],\"articleSection\":[\"News\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/commons.ngi.eu\/2024\/04\/24\/responding-to-xz-utils-can-a-digital-commons-approach-reinforce-oss-security\/\",\"url\":\"https:\/\/commons.ngi.eu\/2024\/04\/24\/responding-to-xz-utils-can-a-digital-commons-approach-reinforce-oss-security\/\",\"name\":\"Responding to XZ utils: Can a digital commons approach reinforce OSS security? - NGI Commons\",\"isPartOf\":{\"@id\":\"https:\/\/commons.ngi.eu\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/commons.ngi.eu\/2024\/04\/24\/responding-to-xz-utils-can-a-digital-commons-approach-reinforce-oss-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/commons.ngi.eu\/2024\/04\/24\/responding-to-xz-utils-can-a-digital-commons-approach-reinforce-oss-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/commons.ngi.eu\/wp-content\/uploads\/2024\/04\/pexels-sora-shimazaki-5935794-1-scaled.jpg\",\"datePublished\":\"2024-04-24T10:45:14+00:00\",\"dateModified\":\"2024-05-07T06:36:32+00:00\",\"description\":\"The recent exposure of the XZ utils backdoor rattled the open source and cybersecurity communities.\",\"breadcrumb\":{\"@id\":\"https:\/\/commons.ngi.eu\/2024\/04\/24\/responding-to-xz-utils-can-a-digital-commons-approach-reinforce-oss-security\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/commons.ngi.eu\/2024\/04\/24\/responding-to-xz-utils-can-a-digital-commons-approach-reinforce-oss-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/commons.ngi.eu\/2024\/04\/24\/responding-to-xz-utils-can-a-digital-commons-approach-reinforce-oss-security\/#primaryimage\",\"url\":\"https:\/\/commons.ngi.eu\/wp-content\/uploads\/2024\/04\/pexels-sora-shimazaki-5935794-1-scaled.jpg\",\"contentUrl\":\"https:\/\/commons.ngi.eu\/wp-content\/uploads\/2024\/04\/pexels-sora-shimazaki-5935794-1-scaled.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"Responding to XZ utils: Can a digital commons approach reinforce OSS security?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/commons.ngi.eu\/2024\/04\/24\/responding-to-xz-utils-can-a-digital-commons-approach-reinforce-oss-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/commons.ngi.eu\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Responding to XZ utils: Can a digital commons approach reinforce OSS security?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/commons.ngi.eu\/fr\/#website\",\"url\":\"https:\/\/commons.ngi.eu\/fr\/\",\"name\":\"NGI Commons\",\"description\":\"Open Source and Internet Commons for Europe\u2019s Digital Sovereignty\",\"publisher\":{\"@id\":\"https:\/\/commons.ngi.eu\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/commons.ngi.eu\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/commons.ngi.eu\/fr\/#organization\",\"name\":\"NGI Commons\",\"url\":\"https:\/\/commons.ngi.eu\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/commons.ngi.eu\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/commons.ngi.eu\/wp-content\/uploads\/2023\/12\/NGI-Commons_avatar.png\",\"contentUrl\":\"https:\/\/commons.ngi.eu\/wp-content\/uploads\/2023\/12\/NGI-Commons_avatar.png\",\"width\":600,\"height\":600,\"caption\":\"NGI Commons\"},\"image\":{\"@id\":\"https:\/\/commons.ngi.eu\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/NGICommons\",\"https:\/\/www.linkedin.com\/showcase\/ngi-commons\/\",\"https:\/\/eupolicy.social\/@NGICommons\",\"https:\/\/bsky.app\/profile\/ngicommons.bsky.social\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/commons.ngi.eu\/fr\/#\/schema\/person\/a03a49ec036860ed92a3c7af6fb33c68\",\"name\":\"margfmartel16\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/commons.ngi.eu\/fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2d1bc814444774591da86b3fdf9b9333648076e124ff078a7f241ff3631546f2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2d1bc814444774591da86b3fdf9b9333648076e124ff078a7f241ff3631546f2?s=96&d=mm&r=g\",\"caption\":\"margfmartel16\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Responding to XZ utils: Can a digital commons approach reinforce OSS security? - NGI Commons","description":"The recent exposure of the XZ utils backdoor rattled the open source and cybersecurity communities.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/commons.ngi.eu\/fr\/2024\/04\/24\/responding-to-xz-utils-can-a-digital-commons-approach-reinforce-oss-security\/","og_locale":"fr_FR","og_type":"article","og_title":"Responding to XZ utils: Can a digital commons approach reinforce OSS security? - NGI Commons","og_description":"The recent exposure of the XZ utils backdoor rattled the open source and cybersecurity communities.","og_url":"https:\/\/commons.ngi.eu\/fr\/2024\/04\/24\/responding-to-xz-utils-can-a-digital-commons-approach-reinforce-oss-security\/","og_site_name":"NGI Commons","article_published_time":"2024-04-24T10:45:14+00:00","article_modified_time":"2024-05-07T06:36:32+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/commons.ngi.eu\/wp-content\/uploads\/2024\/04\/pexels-sora-shimazaki-5935794-1-scaled.jpg","type":"image\/jpeg"}],"author":"margfmartel16","twitter_card":"summary_large_image","twitter_creator":"@NGICommons","twitter_site":"@NGICommons","twitter_misc":{"\u00c9crit par":"margfmartel16","Dur\u00e9e de lecture estim\u00e9e":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/commons.ngi.eu\/2024\/04\/24\/responding-to-xz-utils-can-a-digital-commons-approach-reinforce-oss-security\/#article","isPartOf":{"@id":"https:\/\/commons.ngi.eu\/2024\/04\/24\/responding-to-xz-utils-can-a-digital-commons-approach-reinforce-oss-security\/"},"author":{"name":"margfmartel16","@id":"https:\/\/commons.ngi.eu\/fr\/#\/schema\/person\/a03a49ec036860ed92a3c7af6fb33c68"},"headline":"Responding to XZ utils: Can a digital commons approach reinforce OSS security?","datePublished":"2024-04-24T10:45:14+00:00","dateModified":"2024-05-07T06:36:32+00:00","mainEntityOfPage":{"@id":"https:\/\/commons.ngi.eu\/2024\/04\/24\/responding-to-xz-utils-can-a-digital-commons-approach-reinforce-oss-security\/"},"wordCount":1672,"publisher":{"@id":"https:\/\/commons.ngi.eu\/fr\/#organization"},"image":{"@id":"https:\/\/commons.ngi.eu\/2024\/04\/24\/responding-to-xz-utils-can-a-digital-commons-approach-reinforce-oss-security\/#primaryimage"},"thumbnailUrl":"https:\/\/commons.ngi.eu\/wp-content\/uploads\/2024\/04\/pexels-sora-shimazaki-5935794-1-scaled.jpg","keywords":["Open Future","OpenForum Europe","OSS security"],"articleSection":["News"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/commons.ngi.eu\/2024\/04\/24\/responding-to-xz-utils-can-a-digital-commons-approach-reinforce-oss-security\/","url":"https:\/\/commons.ngi.eu\/2024\/04\/24\/responding-to-xz-utils-can-a-digital-commons-approach-reinforce-oss-security\/","name":"Responding to XZ utils: Can a digital commons approach reinforce OSS security? - NGI Commons","isPartOf":{"@id":"https:\/\/commons.ngi.eu\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/commons.ngi.eu\/2024\/04\/24\/responding-to-xz-utils-can-a-digital-commons-approach-reinforce-oss-security\/#primaryimage"},"image":{"@id":"https:\/\/commons.ngi.eu\/2024\/04\/24\/responding-to-xz-utils-can-a-digital-commons-approach-reinforce-oss-security\/#primaryimage"},"thumbnailUrl":"https:\/\/commons.ngi.eu\/wp-content\/uploads\/2024\/04\/pexels-sora-shimazaki-5935794-1-scaled.jpg","datePublished":"2024-04-24T10:45:14+00:00","dateModified":"2024-05-07T06:36:32+00:00","description":"The recent exposure of the XZ utils backdoor rattled the open source and cybersecurity communities.","breadcrumb":{"@id":"https:\/\/commons.ngi.eu\/2024\/04\/24\/responding-to-xz-utils-can-a-digital-commons-approach-reinforce-oss-security\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/commons.ngi.eu\/2024\/04\/24\/responding-to-xz-utils-can-a-digital-commons-approach-reinforce-oss-security\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/commons.ngi.eu\/2024\/04\/24\/responding-to-xz-utils-can-a-digital-commons-approach-reinforce-oss-security\/#primaryimage","url":"https:\/\/commons.ngi.eu\/wp-content\/uploads\/2024\/04\/pexels-sora-shimazaki-5935794-1-scaled.jpg","contentUrl":"https:\/\/commons.ngi.eu\/wp-content\/uploads\/2024\/04\/pexels-sora-shimazaki-5935794-1-scaled.jpg","width":2560,"height":1707,"caption":"Responding to XZ utils: Can a digital commons approach reinforce OSS security?"},{"@type":"BreadcrumbList","@id":"https:\/\/commons.ngi.eu\/2024\/04\/24\/responding-to-xz-utils-can-a-digital-commons-approach-reinforce-oss-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/commons.ngi.eu\/"},{"@type":"ListItem","position":2,"name":"Responding to XZ utils: Can a digital commons approach reinforce OSS security?"}]},{"@type":"WebSite","@id":"https:\/\/commons.ngi.eu\/fr\/#website","url":"https:\/\/commons.ngi.eu\/fr\/","name":"NGI Commons","description":"Open Source and Internet Commons for Europe\u2019s Digital Sovereignty","publisher":{"@id":"https:\/\/commons.ngi.eu\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/commons.ngi.eu\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/commons.ngi.eu\/fr\/#organization","name":"NGI Commons","url":"https:\/\/commons.ngi.eu\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/commons.ngi.eu\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/commons.ngi.eu\/wp-content\/uploads\/2023\/12\/NGI-Commons_avatar.png","contentUrl":"https:\/\/commons.ngi.eu\/wp-content\/uploads\/2023\/12\/NGI-Commons_avatar.png","width":600,"height":600,"caption":"NGI Commons"},"image":{"@id":"https:\/\/commons.ngi.eu\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/NGICommons","https:\/\/www.linkedin.com\/showcase\/ngi-commons\/","https:\/\/eupolicy.social\/@NGICommons","https:\/\/bsky.app\/profile\/ngicommons.bsky.social"]},{"@type":"Person","@id":"https:\/\/commons.ngi.eu\/fr\/#\/schema\/person\/a03a49ec036860ed92a3c7af6fb33c68","name":"margfmartel16","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/commons.ngi.eu\/fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2d1bc814444774591da86b3fdf9b9333648076e124ff078a7f241ff3631546f2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2d1bc814444774591da86b3fdf9b9333648076e124ff078a7f241ff3631546f2?s=96&d=mm&r=g","caption":"margfmartel16"}}]}},"taxonomy_info":{"category":[{"value":1,"label":"News"}],"post_tag":[{"value":583,"label":"Open Future"},{"value":582,"label":"OpenForum Europe"},{"value":584,"label":"OSS security"}]},"featured_image_src_large":["https:\/\/commons.ngi.eu\/wp-content\/uploads\/2024\/04\/pexels-sora-shimazaki-5935794-1-1024x683.jpg",1024,683,true],"author_info":{"display_name":"margfmartel16","author_link":"https:\/\/commons.ngi.eu\/fr\/author\/margfmartel16\/"},"comment_info":0,"category_info":[{"term_id":1,"name":"News","slug":"news","term_group":0,"term_taxonomy_id":1,"taxonomy":"category","description":"","parent":0,"count":47,"filter":"raw","cat_ID":1,"category_count":47,"category_description":"","cat_name":"News","category_nicename":"news","category_parent":0}],"tag_info":[{"term_id":583,"name":"Open Future","slug":"open-future","term_group":0,"term_taxonomy_id":583,"taxonomy":"post_tag","description":"","parent":0,"count":3,"filter":"raw"},{"term_id":582,"name":"OpenForum Europe","slug":"openforum-europe","term_group":0,"term_taxonomy_id":582,"taxonomy":"post_tag","description":"","parent":0,"count":3,"filter":"raw"},{"term_id":584,"name":"OSS security","slug":"oss-security","term_group":0,"term_taxonomy_id":584,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw"}],"_links":{"self":[{"href":"https:\/\/commons.ngi.eu\/fr\/wp-json\/wp\/v2\/posts\/53226","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/commons.ngi.eu\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/commons.ngi.eu\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/commons.ngi.eu\/fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/commons.ngi.eu\/fr\/wp-json\/wp\/v2\/comments?post=53226"}],"version-history":[{"count":0,"href":"https:\/\/commons.ngi.eu\/fr\/wp-json\/wp\/v2\/posts\/53226\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/commons.ngi.eu\/fr\/wp-json\/wp\/v2\/media\/53227"}],"wp:attachment":[{"href":"https:\/\/commons.ngi.eu\/fr\/wp-json\/wp\/v2\/media?parent=53226"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/commons.ngi.eu\/fr\/wp-json\/wp\/v2\/categories?post=53226"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/commons.ngi.eu\/fr\/wp-json\/wp\/v2\/tags?post=53226"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}