{"id":959186,"date":"2025-09-03T11:54:21","date_gmt":"2025-09-03T06:24:21","guid":{"rendered":"https:\/\/telecomlive.in\/web\/?p=959186"},"modified":"2025-09-03T11:54:21","modified_gmt":"2025-09-03T06:24:21","slug":"your-online-life-government-secrets-banking-data-and-more-rest-on-the-shoulders-of-one-tired-programmer-in-moscow","status":"publish","type":"post","link":"https:\/\/telecomlive.in\/web\/2025\/09\/03\/your-online-life-government-secrets-banking-data-and-more-rest-on-the-shoulders-of-one-tired-programmer-in-moscow\/","title":{"rendered":"Your online life, government secrets, banking data and more rest on the shoulders of one tired programmer in Moscow"},"content":{"rendered":"<p>A huge amount of technology that powers our daily lives relies on what\u2019s called \u201copen-source\u201d software. Open-source means the inner workings of a tool or program are free for anyone to use or improve. But what\u2019s surprising and risky about this arrangement is that many of these vital tools are created and maintained by just one person.<\/p>\n<p>For example, a program called \u2018fast-glob\u2019 helps computers quickly find and organise files. It is so helpful that it has been added to thousands of other computer programs, including some used by the US Department of Defense (DoD), according to security company Hunted Labs. The same firm revealed that \u2018fast-glob\u2019 is present in over 30 US military software packages and is downloaded about 75 million times every week.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A huge amount of technology that powers our daily lives relies on what\u2019s called \u201copen-source\u201d software. Open-source means the inner workings of a tool or program are free for anyone to use or improve. But what\u2019s surprising and risky about this arrangement is that many of these vital tools are created and maintained by just one person. For example, a program called \u2018fast-glob\u2019 helps computers quickly find and organise files. It is so helpful that it has been added to thousands of other computer programs, including some used by the US Department of Defense (DoD), according to security company Hunted [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[15,51,4],"tags":[],"class_list":["post-959186","post","type-post","status-publish","format-standard","hentry","category-hindustantimes","category-it-2-hindustantimes","category-newspapers"],"acf":[],"_links":{"self":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/posts\/959186","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/comments?post=959186"}],"version-history":[{"count":0,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/posts\/959186\/revisions"}],"wp:attachment":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/media?parent=959186"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/categories?post=959186"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/tags?post=959186"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}