<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Serkan Holat</title>
    <description>The latest articles on DEV Community by Serkan Holat (@coni2k).</description>
    <link>https://dev.to/coni2k</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F308391%2Fa7c6a483-1e68-4b33-9337-74083251ae43.jpg</url>
      <title>DEV Community: Serkan Holat</title>
      <link>https://dev.to/coni2k</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/coni2k"/>
    <language>en</language>
    <item>
      <title>The US Government, Open Source Software and Analyzing 786 Pages of Responses - Highlights</title>
      <dc:creator>Serkan Holat</dc:creator>
      <pubDate>Fri, 15 Dec 2023 11:55:40 +0000</pubDate>
      <link>https://dev.to/coni2k/the-us-government-open-source-software-and-analyzing-786-pages-of-responses-highlights-54ii</link>
      <guid>https://dev.to/coni2k/the-us-government-open-source-software-and-analyzing-786-pages-of-responses-highlights-54ii</guid>
      <description>&lt;p&gt;&lt;strong&gt;A semi-professional content analysis on the submitted responses to the US Government's Request for Information on Open Source Software&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Part II: Highlights&lt;/strong&gt;&lt;/p&gt;




&lt;p&gt;Welcome to the second part of the series, covering the sections that stood out while reviewing the responses to the US Government's &lt;a href="https://www.whitehouse.gov/oncd/briefing-room/2023/08/10/fact-sheet-office-of-the-national-cyber-director-requests-public-comment-on-open-source-software-security-and-memory-safe-programming-languages/"&gt;Request for Information (RFI) on Open Source Software&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;You will find a compilation of highlights from 25 organizations, including tech companies, foundations, universities, and security firms. Mainly in a single-paragraph format and alphabetically ordered, they are collected under seven topics, each with a link to the original response and without additional commentary.&lt;/p&gt;

&lt;p&gt;As a reminder, my priority centered on how the organizations define open source software, its challenges, and the proposed solutions, particularly from a funding perspective. Therefore, you will see fewer items related to technical solutions, even though the RFI's primary focus is on software security.&lt;/p&gt;

&lt;p&gt;Enjoy reading the collection, which I hope should provide a distinct insight into the overall state of the ecosystem. As always, please feel free to share your thoughts and questions!&lt;/p&gt;




&lt;h2&gt;
  
  
  Topics
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Current State&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Facts and Figures&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Most Important Area&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Public Funding&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Ideas and Insights&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Let's Be Frank&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Rules and Regulations&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Current State
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.regulations.gov/comment/ONCD-2023-0002-0021"&gt;Anchore, Inc&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Modern day funding of core open source projects is not likely to generate revenue, because the current development model is not sustainable for many small open source projects. As a result, the current open source model does not incentivize or reward secure development practices.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://www.regulations.gov/comment/ONCD-2023-0002-0102"&gt;Chainguard&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;In sum, open source software security is a public policy problem in the same way that “health” or “housing” or “foreign affairs” is a public policy problem. It’s just newer. And that newness is exciting, but that same newness should also be a reason for some caution and modesty.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://www.regulations.gov/comment/ONCD-2023-0002-0075"&gt;Eclipse Foundation&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;One of the greatest challenges to sustaining open source software lies in its economic model. Access to the benefits of software which has been developed and licensed as open source is freely available to all actors in the ecosystem. Many companies deriving the benefits of OSS for a range of well-understood reasons contribute back to the projects which serve as the basis of their commercialized offerings, while many more do not. This later behavior is referred to as “free riding” and is not one of the industry’s better practices.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://www.regulations.gov/comment/ONCD-2023-0002-0071"&gt;Microsoft Corporation&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;To deal with [the lack of investment and participation in open-source software] challenges effectively, governments must adopt a long-term view that considers the security, sustainability, and resilience of these vital systems. Instead of prioritizing short-term interventions, governments should invest in holistic solutions and strategic partnerships that lower systemic risk, improve efficiency, and increase competitiveness.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://www.regulations.gov/comment/ONCD-2023-0002-0073"&gt;Open Source Initiative (OSI)&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;However, many companies that rely on OSS do not contribute back financially to the OSS projects and communities upon which their service offerings rely. The very licenses that govern open source require freedom of use, which means that the commercial entities that use OSS are free to do so without contributing to the security and health of the software. This is sometimes referred to as the “free-rider” or “tragedy of the commons” problem. This freedom to use and reuse has resulted in a boon to innovation, but not in economic equity and sustainability. Inconsistent support for open source projects by the commercial entities that use them has been a difficult problem to solve.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://www.regulations.gov/comment/ONCD-2023-0002-0056"&gt;Open@RIT - Rochester Institute of Technology&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;In an era where digital advancements are critical for addressing global challenges, including climate change, public health crises, and technological innovations, there is a growing recognition that the siloed nature of digital infrastructure development is unsustainable. To harness the full potential of digital knowledge, it is imperative to foster an environment that promotes openness, collaboration, and the removal of barriers to access.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://www.regulations.gov/comment/ONCD-2023-0002-0046"&gt;OpenSSF&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;As a public good, there is a market failure when it comes to dedicating resources to open-source communities. There are few incentives for many organizations to participate, and yet those organizations all benefit when another organization does commit resources and personnel to the cause – a variation of the "tragedy of the commons."&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://www.regulations.gov/comment/ONCD-2023-0002-0045"&gt;Rust Foundation&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;A related issue that represents a real security and stability risk in Open-Source is the reliance of Open-Source Software Foundations upon the goodwill of private sector companies to donate their resources in-kind to cover these infrastructure costs. As it currently stands, the world's basic infrastructure and hosting costs for Open-Source languages (not only Rust, but several of the top 10 most used languages in the world) are supported by only a handful of vendors. Any one of these vendors exiting the market or pivoting their strategy would deal a severe blow to the security and stability of the ecosystem, and would have the potential to effectively bankrupt the Foundation affected.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://www.regulations.gov/comment/ONCD-2023-0002-0048"&gt;Tidelift, Inc.&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;The bottom line for the impact of volunteerism on government and industry is that deep, fundamental security work requires constant, consistent work and uncompensated volunteers don’t typically get work done on a constant, consistent basis.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  Facts and Figures
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.regulations.gov/comment/ONCD-2023-0002-0106"&gt;Apache Software Foundation&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;While that scenario of individual developers may seem like an outlier, it is not an insignificant portion of the ecosystem. The 2022 Census II of Free and Open Source Software found that 94% of projects had fewer than ten developers accounting for more than 90% of the lines of code added. In 49 of the top 50 non-npm projects reviewed, nearly a quarter of them had only one developer responsible for more than 80% of the lines of code added.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://www.regulations.gov/comment/ONCD-2023-0002-0073"&gt;Open Source Initiative (OSI)&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;The FreeBSD Foundation has also identified three security roles that it needs to fill in order to strengthen the project’s security posture to meet current and future needs. These three people will add $500,000 in currently unfunded annual salary expenses. Significantly securing critical OSS software will require a significant increase in investment.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://www.regulations.gov/comment/ONCD-2023-0002-0107"&gt;Python Software Foundation&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;The first version of PyPI was opened for public use over twenty years ago in 2002, and it continues to be the main repository for open-source Python packages. PyPI has grown to host over 490,000 distinct projects, with over 5 million releases, which are downloaded collectively over a billion times per day. Maintainers upload roughly between 12,000-15,000 new releases per day to PyPI. PyPI website typically receives between 3.7 and 4 million unique visitors (humans) per month. PyPI receives approximately 3 billion web requests per day for projects hosted on its infrastructure (approx. 90 billion per month).&lt;/p&gt;

&lt;p&gt;A large volume of projects on PyPI ... are maintained by volunteers, not by corporations. Many projects are even maintained by a sole maintainer, often without the resources or even the knowledge to update their package publishing processes to more secure methods. Out of 490,000 projects on PyPI, 91% of projects have a single account with the maintainer role.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://www.regulations.gov/comment/ONCD-2023-0002-0045"&gt;Rust Foundation&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;The scaling and adoption of memory-safe languages such as Rust has related challenges in the associated scaling of the infrastructure that supports the language. The Rust Foundation is responsible for hosting Crates.io, the package repository for Rust, which alone costs upwards of $40k per month as of August 2023, and this cost rises monthly as the development and adoption of Rust increases. This is one of several infrastructure costs that the Rust Foundation is obligated to meet in order for individuals and companies to use the language to build.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://www.regulations.gov/comment/ONCD-2023-0002-0066"&gt;Sonatype, Inc.&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Over the last decade, Sonatype has seen first-hand an escalation of attacks that directly target developer and development infrastructure; Solarwinds is just one example of this type of attack. As part of our efforts to secure software repositories, Sonatype has also invested in human and AI/ML approaches to address these new attacks via malicious packages. Having identified over 250,000 malicious packages, the threat to OSS via public repositories and package managers is real.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://www.regulations.gov/comment/ONCD-2023-0002-0048"&gt;Tidelift, Inc.&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Similarly, somewhere around half of open source maintainers do that critical maintenance work alone. In our survey, about 44% of maintainers said they were solo maintainers, and other studies report similar numbers (eg, 57% in the [referenced] study of the most popular projects, and perhaps 93% in the [referenced] study of Python).&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  Most Important Area
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.regulations.gov/comment/ONCD-2023-0002-0068"&gt;Carnegie Mellon University - Software Engineering Institute&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;In summary, the Software Engineering Institute (SEI) considers the behavioral and economic incentives area to be the most important as the incentives will need to influence the behavior of the OSS ecosystem thus achieving the goals of the Open-Source Software Security Initiative's (OS3I) proposed initiatives. Without such incentives, the OSS ecosystem will likely continue its current path and trends likely without the changes the OS3I is attempting to achieve. Though this area is the most important for improvement, it may also be the most challenging. The OS3I and government must devise incentives that will work for the diverse and global open-source software ecosystem. That understanding is not as much a technical one as it is a socioeconomic one. Without that understanding, no amount of technical advancement will be effective. With that understanding, OS3I can engage with the open-source software ecosystem to understand the gaps that exists between OS3I's desired state and the interests of the other stakeholders within the ecosystem as to what foundational needs, technical as well as socioeconomic, are required to close that gap.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://www.regulations.gov/comment/ONCD-2023-0002-0048"&gt;Tidelift, Inc.&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;[Our] response to the ONCD Request for Information will focus specifically on the RFI topic area of “incentives for securing the open source ecosystem.” We believe that this is, in many ways, the most important area called out in the RFI. Open source is not magic! While other areas called out in the RFI are important, if incentives and motivations of open source maintainers are not well-understood by policy-makers, those other improvements will not happen, or will happen only slowly. That puts the question of incentives and motivation on the critical path for almost all other improvements to the security of the open source ecosystem.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  Public Funding
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.regulations.gov/comment/ONCD-2023-0002-0082"&gt;Amazon Web Services&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Many, if not all, of the recommendations, actions, or potential regulations that may emerge as a result of this RFI will require significant work from maintainers and producers of OSS projects. In some cases the outputs of this process may lead to ongoing costs for things like additional infrastructure and recurring audits. Many OSS projects are run on an entirely voluntary basis by people who are not paid for their efforts, providing them with a significant challenge to fund this kind of additional work. Additionally, any risk of inequitable liability requirements will diminish their available funds to support OSS security best practices and requirements. Just as many other items discussed in this response require funding, finding a way to fund the work needed from small, independent projects is an important element of this overall effort that must be prioritized.&lt;/p&gt;

&lt;p&gt;Organized funds to improve open source security are already having an impact. Linux Foundation’s Alpha-Omega Project, Germany’s Sovereign Tech Fund, and, while not its specific focus, the United States’ Open Technology Fund have all contributed to improving the open source supply chain. Innovative efforts like the Open Source Technology Improvement Fund (OSTIF) is finding a way to bridge the communications gap between security professionals and open source project maintainers. More is needed to secure the critical foundations of our shared digital infrastructure, and the USG is in a good position to help advance these existing efforts, and potentially establish new ones.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://www.regulations.gov/comment/ONCD-2023-0002-0081"&gt;Atlantic Council - Cyber Statecraft Initiative&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Several federal entities such as NASA and the NSF already provide forms of funding for OSS projects, communities, or research. OS3I can leverage its position as an interagency coordinator to collate lessons from these entities learned in their OSS funding experiences into a best-practices framework for government funding.&lt;/p&gt;

&lt;p&gt;For timely responses to urgent needs in key OSS projects—for example, those heavily used in government or critical infrastructure—government should have a means of quickly allocating funding or other security resources such as developers, infrastructure, or security audits to those projects when required.&lt;/p&gt;

&lt;p&gt;In addition to targeted and timely interventions, government should seek a vehicle for longer-term, sustainable investments in the health of the OSS ecosystem. Government is uniquely well-positioned to take a long-term view on the public goods created by OSS and invest in initiatives to shore up the health of the community to promote these public goods and to forestall costly crises down the line.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://www.regulations.gov/comment/ONCD-2023-0002-0075"&gt;Eclipse Foundation&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Explore the feasibility of creating the equivalent of the Sovereign Tech Fund in the US, with a focus on contributing to sustaining and improving security of the open source software which the US federal government depends upon which might otherwise go untended. Choose a federal agency to create an appropriate agreement to underwrite the effort and give the program a three year pilot period to demonstrate impact.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://www.regulations.gov/comment/ONCD-2023-0002-0084"&gt;GitHub&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;The federal government should establish an open-source software infrastructure fund like the German Sovereign Tech Fund model. One implementation option would be to expand the Open Technology Fund’s recently established Free and Open Source Software Sustainability Fund with a simple mandate to support important open source digital infrastructure.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://www.regulations.gov/comment/ONCD-2023-0002-0074"&gt;Google&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Open source software is a critical element of US digital infrastructure that needs financial support through new and existing public funding sources. The federal government should partner with existing OSS foundations such as the Rust Foundation, Python Software Foundation, Eclipse Foundation, Linux Foundation, Open Source Security Foundation (OpenSSF), and many others with expertise in this space. The federal government can leverage their collective knowledge and relationships to most effectively direct funding and support to key projects.&lt;/p&gt;

&lt;p&gt;The federal government should consider expanding the availability of public funding programs for open source technologies, similar to grant programs such as the OpenSSF’s Alpha-Omega Program, US AGM’s Open Tech Fund, Mozilla’s Open Source Support Awards, and the German government’s Sovereign Tech Fund. The National Science Foundation’s Pathways to Enable Open Source Ecosystems (POSE) program is a promising experiment in direct public funding of open source innovation, and we applaud its mission to foster wholly new open source foundations and ecosystems. POSE would be most effective if paired with a funding vehicle in the form of an “Open Source Tech Fund,” providing financial support for US and international organizations that maintain key open source projects. This support will help ensure the security and sustainability of critical, widely used and free public services like software repositories.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://www.regulations.gov/comment/ONCD-2023-0002-0046"&gt;OpenSSF&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Identify critical OSS projects/foundations and support them to improve their security, through funds or other contributions. One example is the Alpha-Omega project, a technical initiative of the OpenSSF. Alpha-Omega provides a path for industry to come together to catalyze critical OSS projects and foundations as they improve their OSS security in systemic and durable ways. It does this by funding security staffing, ecosystem-wide improvements, project audits, and security tooling. We would also like to see the OS3I supporting a government funding parallel to Alpha-Omega, similar to Germany's Sovereign Tech Fund or the differently focused Open Technology Fund.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  Ideas and Insights
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.regulations.gov/comment/ONCD-2023-0002-0081"&gt;Atlantic Council - Cyber Statecraft Initiative&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Government OSPO:&lt;/strong&gt; The OS3I should serve as a prototype for and coordinator of US government open source program offices (OSPOs). First, OS3I should collate lessons learned from OSPOs in industry, academia, and US and foreign governments into guidance for US government agencies developing their own. It should also coordinate existing and future agency-level OSPOs or similarly tasked offices and serve as a functional single point of contact for OSS issues communicated to the US government in coordination with the ONCD, rerouting outreach to the correct offices and backstopping where none yet exists.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Tracking dependencies:&lt;/strong&gt; The rapid pace of digital innovation and the informal relationships between OSS dependencies and their downstream beneficiaries has created a digital ecosystem prone to stacking risk on a relatively small number of critical OSS projects. It’s also created challenges for entities—including government—seeking visibility into those points of concentration. Tracking dependencies is key to managing risk, and OSS dependencies run deep and quiet—US government cannot secure what it does not know it relies upon, hampering its ability to preempt or respond to crisis.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://www.regulations.gov/comment/ONCD-2023-0002-0101"&gt;Cybersecurity Coalition Comments&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;All software:&lt;/strong&gt; While utilizing memory safe languages can contribute towards more resilient software, it cannot be viewed in isolation. Practicing safe cyber hygiene and abiding by industry best practices are also important factors contributing to the overall security of open source software security. It is important to remember that all software has the potential to contain vulnerabilities, and therefore we should avoid concentrating on specific technical issues and instead focus on the overarching security of all critical software.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Tech is evolving:&lt;/strong&gt; We would also caution against mandating certain controls or specific memory safe languages. Technology is always evolving, and what may be considered best-in-class today could change tomorrow. Therefore, mandating specific controls in a regulation that could stand for decades is short sided. Instead, requiring ‘adherence to security best practices’ or referring to standards or frameworks that are more regularly updated is preferred.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://www.regulations.gov/comment/ONCD-2023-0002-0030"&gt;Datalytica&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Federally-funded bug bounty programs:&lt;/strong&gt; The current and most popular bug bounty programs are “Hack the Pentagon” and “Hack Department of Homeland Security (DHS)”. One drawback to these efforts are that they are time-bound events, which some cybersecurity experts believe may not deliver consistent security improvements. A dramatically improved bug bounty program would persist over time and would involve increased public transparency (e.g., live streaming with Social Media presence, drawing broad viewership), industry collaboration, increasing the incentives, and expanding the scope of targets.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://www.regulations.gov/comment/ONCD-2023-0002-0075"&gt;Eclipse Foundation&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;SBOM registry:&lt;/strong&gt; Creating a centralized, accessible SBOM registry that not only stores these materials but also performs automated analysis could be a game-changer. The registry would offer to store an SBOM for any official release of any software product. This could include simple tasks such as automatic conversions (when possible) between CycloneDX and SPDX, automatic dependency checks, license compatibility evaluations, and even security vulnerability assessments. It could also compare SBOMs generated by different providers (for example different Linux distributions shipping the same software with slightly different options). Such a service would provide immediate, actionable insights for developers, making SBOM generation a value-added activity, because of the access of those additional functions. Results of the analysis should be publicly available.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://www.regulations.gov/comment/ONCD-2023-0002-0035"&gt;Institute for Security and Technology (IST)&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Centralized database of known vulnerabilities:&lt;/strong&gt; We encourage the U.S. government to focus first on developing a centralized database of known vulnerabilities, along with tools and approaches to identify vulnerabilities at scale. It is critical to first understand the scale and scope of the open-source ecosystem and its associated security issues before identifying opportunities to increase its security.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://www.regulations.gov/comment/ONCD-2023-0002-0069"&gt;OWASP Foundation, Inc.&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;On memory safety:&lt;/strong&gt; Memory safety is not a panacea. Memory safety helps with a bug class not highly present in web application languages, frameworks, and APIs - buffer overflows. OWASP notes that memory-safe languages do not address the following bug classes, including insecure, insufficient, or missing:&lt;br&gt;
• Architecture&lt;br&gt;
• Authentication and Session Management&lt;br&gt;
• Authorization&lt;br&gt;
• Input validation and output encoding&lt;br&gt;
• Cryptographic Flaws&lt;br&gt;
• Error Handling&lt;br&gt;
• Data Protection and Privacy&lt;br&gt;
• Secure communications&lt;br&gt;
• Malicious code checks&lt;br&gt;
• Business Logic Flaws&lt;br&gt;
• File and Resource Handling&lt;br&gt;
• API Security&lt;br&gt;
• Configuration&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://www.regulations.gov/comment/ONCD-2023-0002-0073"&gt;Open Source Initiative (OSI)&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Updating procurement rules:&lt;/strong&gt; Through a multi-agency effort, the federal government should update its procurement rules to prefer technology suppliers that demonstrate financial and/or engineering support for the OSS in the suppliers own solution stack. This preference should apply to both cloud and on-premises solutions provided to the US Government.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://www.regulations.gov/comment/ONCD-2023-0002-0107"&gt;Python Software Foundation&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Centrally curated toolset:&lt;/strong&gt; Right now, projects need to adopt each standard or tool implementing the standard individually and must use customized workflows or configurations, which dissuades many projects from adopting. Toward these standards being adopted by critical open-source Python projects, we propose creating a centrally curated toolset for building Python packages with optimal security practices enabled by default. A central toolset would require a relatively small investment to leverage existing security technology to create widespread adoption in one of the largest open source ecosystems in the world.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Surveying the ecosystem:&lt;/strong&gt; Because every migration of a project into memory safety requires time and resources, it is critical to prioritize projects that are most important to migrate and to avoid placing undue burden on projects which are less or not safety-critical. The nature of open source consumption doesn’t lend itself to knowing how and where a project is being used, so many project maintainers don’t know whether security must be prioritized for their own projects, increasing the complexity of this task. Effectively prioritizing candidate projects for migration would require surveying the ecosystem with usage information (number of downloads, dependency graph information, and input from consumers like the federal government) and whether their primary function would benefit from using a memory safe language (such as packages implementing cryptography or processing uncontrolled inputs).&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://www.regulations.gov/comment/ONCD-2023-0002-0105"&gt;Red Hat, Inc.&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;On package repos:&lt;/strong&gt; Engagement with these key centers of distribution [‘warehouses’ (also known as package repositories)], which fill a vital function and are heavily depended on by the ecosystem, to improve their security posture could reap significant systemic benefits for software developers, vendors, service providers and users. Many of the packages and much of the community code found in warehouses are unsigned and have little information on their provenance. As a result, it is challenging to validate that the software received is authentic and intended for use by the maintainer, whether it is legitimate, or whether it is safe.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;On memory safety:&lt;/strong&gt; The fact is that there is a growing use of memory safe languages in development communities. This is a major step forward in good programming practices. However, it is of no value when hastily implemented by developers lacking the proper training and experience to develop quality software. An experienced and security-focused C++ developer is more likely to produce code of greater efficiency and execution security than an inexperienced Rust developer.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://www.regulations.gov/comment/ONCD-2023-0002-0097"&gt;The Open Source Technology Improvement Fund&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Identifying the under-maintained projects:&lt;/strong&gt; Projects first need to be identified and categorized by their lifecycle status, language, and relationship to critical infrastructure. There are millions of projects across billions of installs, so we need to prioritize appropriately. A critical exercise that will take approximately $10 million and between one to two years to complete is the identifying of projects in our infrastructure that are under maintained. The administration can start with supporting the Software Bill of Materials and any initiatives that identify software that is no longer maintained.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  Let's Be Frank
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.regulations.gov/comment/ONCD-2023-0002-0102"&gt;Chainguard&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Un-asked question:&lt;/strong&gt; ... the U.S. federal government should first define, assess and improve its own open source software security and, next, that of critical infrastructure, before seeking to contribute broadly to the safety and security of free and open source software writ large.&lt;/p&gt;

&lt;p&gt;Why focus on the federal government’s own open source software supply chain? Because it’s mostly a black box and likely full of the known dangers and risks that companies and open source software developers have been coping with. Does any entity within the federal government have a machine-readable list of all the software that entity depends upon and the open source software components within it? If the answer is no, and all indications are that the answer is no, then assessing the open source software security of the government isn’t even an unsolved problem; it’s more like an un-asked question.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://www.regulations.gov/comment/ONCD-2023-0002-0066"&gt;Sonatype, Inc.&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;No intention for change:&lt;/strong&gt; Unfortunately, we have observed and heard directly from organizations that do not believe the government intends to change the status quo. Their belief is supported, in their opinion, by a lack of specific action by the federal government to hold software organizations directly responsible and accountable. Given this, they hold much of the current rhetoric and public discourse as nothing more than pageantry with no intention for change.&lt;/p&gt;

&lt;p&gt;Sonatype does not hold this belief but recommends that the government should take clear, public steps in demonstrating the actions and capabilities of the federal government on these issues.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://www.regulations.gov/comment/ONCD-2023-0002-0097"&gt;The Open Source Technology Improvement Fund&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Very few good feelings:&lt;/strong&gt; You need to build trust with the community which has been slowly chipped away over decades of government secrecy, spying, oversight, and perceived miserliness. In order to accomplish even the short-term projects suggested by this RFI, it will be necessary for the government agencies working on this to set aside their egos in the name of enacting change. Frankly, no one in the open source industry is going to willingly sign up for projects that are directly and singularly run by government agencies. There are very few good feelings towards government management or involvement in open source, especially in security. What you need to do is demonstrate that this government is transparent in its funding and support of security improvements for projects with no ulterior motives.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The biggest challenge:&lt;/strong&gt; Possibly the biggest challenge in defining and acting upon open source projects’ security is that big tech companies will not easily accept having to spend their profits on security efforts that do not just benefit themselves. Proprietary firms do not feel that using open source code is a commitment to the community of users and buyers of their software and hardware. Not only do they not practice any accountability back to open source, they benefit massively from the contributions and code of others for free.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  Rules and Regulations
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.regulations.gov/comment/ONCD-2023-0002-0106"&gt;Apache Software Foundation&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;While the general intentions of Europe’s Cyber Resilience Act (CRA) and Product Liability Directive (PLD) are welcomed in general–and their much-needed bolstering of security in particular–we are concerned by the proposed specifics. Proposed regulation imposes obligations too early in the supply chain, risking stifling innovation and jeopardizing the ability of open source organizations, such as the Apache Software Foundation, to make a positive contribution by coordinating the downstream industry with regard to security.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://www.regulations.gov/comment/ONCD-2023-0002-0045"&gt;Rust Foundation&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Funds for the support of OSS will require international disbursement with minimum bureaucracy in order for those funds to be allocated appropriately and to generate the desired impact. Any financial contribution or investment frameworks developed to funnel funds towards this work must ensure that they are free from substantial bureaucracy or restrictions.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://www.regulations.gov/comment/ONCD-2023-0002-0084"&gt;GitHub&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;International collaboration can multiply the impact of federal government activities across all open-source software security priority areas. As with other global challenges and public goods, national governments share common interests in security, even among competitors. Each of the areas identified by the RFI should be on the agendas of most national governments. US diplomacy should encourage other national governments to increase and coordinate investments in open-source software security, utilizing the motion itself to build trust, as well as increasing global resilience by decreasing cyber risk.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://www.regulations.gov/comment/ONCD-2023-0002-0053"&gt;MITRE's Center for Data-Driven Policy&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;The U.S. government should work with and lobby the European Union to modify the current draft language of the CRA to ensure these developers are protected from liability. If we fail to do so, and the CRA is passed with the current language, then the negative effects on the U.S. and global FOSS ecosystem may be substantial.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://www.regulations.gov/comment/ONCD-2023-0002-0093"&gt;RTX Technology Research Center&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;The United States should collaborate with the European Union on the Cyber Resiliency Act to seek standardization of terms such as “Critical Class I/II” and “Critical Infrastructure.” This will enable greater collaboration across international supply chains.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://www.regulations.gov/comment/ONCD-2023-0002-0066"&gt;Sonatype, Inc.&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;We must collaborate with other governments and security agencies to ensure future regulations and policies prevent fragmentation within the OSS ecosystem. OSS is a public good; the contributors and custodians of this public good that underpins all software must be protected and supported through thought policy and regulation.&lt;/p&gt;
&lt;/blockquote&gt;

</description>
      <category>opensource</category>
      <category>techpolicy</category>
    </item>
    <item>
      <title>The US Government, Open Source Software and Analyzing 786 Pages of Responses - Results</title>
      <dc:creator>Serkan Holat</dc:creator>
      <pubDate>Thu, 07 Dec 2023 15:31:41 +0000</pubDate>
      <link>https://dev.to/coni2k/the-us-government-open-source-software-and-analyzing-786-pages-of-responses-results-328h</link>
      <guid>https://dev.to/coni2k/the-us-government-open-source-software-and-analyzing-786-pages-of-responses-results-328h</guid>
      <description>&lt;p&gt;&lt;strong&gt;A semi-professional content analysis on the submitted responses to the US Government's Request for Information on Open Source Software&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Part I: Results&lt;/strong&gt;&lt;/p&gt;




&lt;p&gt;In August, the US Government issued a public call in the form of a Request For Information (RFI) regarding open source software. The objective was to seek input from private and public sectors and start formulating a long-term strategy and action plan for the federal government to strengthen the open source ecosystem.&lt;/p&gt;

&lt;p&gt;Here is an excerpt from &lt;a href="https://www.whitehouse.gov/oncd/briefing-room/2023/08/10/fact-sheet-office-of-the-national-cyber-director-requests-public-comment-on-open-source-software-security-and-memory-safe-programming-languages/"&gt;the official press release&lt;/a&gt;:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;In addition to its many benefits, the ubiquity of open-source software in commercial products, government systems, and military platforms presents unique security risks. For this reason, the White House established the Open-Source Software Security Initiative (OS3I), an interagency working group with the goal of identifying policy solutions and channeling government resources to foster greater open-source software security across the ecosystem. By working with other interagency partners, OS3I identified several focus areas, including&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;(i) increasing the proliferation of memory safe programming languages;&lt;/li&gt;
&lt;li&gt;(ii) designing implementation requirements for secure, privacy-preserving security attestations;&lt;/li&gt;
&lt;li&gt;and (iii) identifying and promoting focused areas for prioritization.&lt;/li&gt;
&lt;/ul&gt;
&lt;/blockquote&gt;

&lt;p&gt;For more detailed information about the RFI, you can refer to the following link:&lt;br&gt;
&lt;a href="https://www.regulations.gov/docket/ONCD-2023-0002"&gt;Request for Information on Open-Source Software Security: Areas of Long-Term Focus and Prioritization&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  National Public Fund to Finance Open Source Ecosystem
&lt;/h2&gt;

&lt;p&gt;As a dedicated advocate for &lt;a href="https://dev.to/coni2k/open-source-public-fund-experiment-lc8"&gt;Agile Public Funds&lt;/a&gt;, I took the opportunity to contribute by submitting a 'National Public Fund to Finance Open Source Ecosystem' proposal to the RFI.&lt;/p&gt;

&lt;p&gt;Briefly, considering OSS falls under the &lt;a href="https://www.britannica.com/money/topic/public-good-economics"&gt;public good&lt;/a&gt; category and its global consumption leads to the well-known &lt;a href="https://www.britannica.com/topic/free-riding"&gt;Free-rider problem&lt;/a&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Can we establish dedicated funds to overcome coordination issues?&lt;/li&gt;
&lt;li&gt;And can we design these funds tailored to the fast-paced nature of these new digital public goods?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Below is the Principles section for the Scalable Public Funds:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Proactive: The fund should proactively identify and evaluate eligible open source initiatives, reducing bureaucracy and uncertainty.&lt;/li&gt;
&lt;li&gt;Scalable: The fund should be designed to scale, accounting for the continued growth of the open source ecosystem.&lt;/li&gt;
&lt;li&gt;Data-Driven: Resource allocation should rely on objective metrics, ensuring unbiased distribution.&lt;/li&gt;
&lt;li&gt;Transparent: The evaluation criteria, metrics, and weights should be publicly accessible.&lt;/li&gt;
&lt;li&gt;Continuous: Acknowledging the ongoing contributions of the OSS to the economy, the fund should commit to generating constant revenue rather than one-off payments.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;To review the proposal, you can visit the following link:&lt;br&gt;
&lt;a href="https://downloads.regulations.gov/ONCD-2023-0002-0061/attachment_1.pdf"&gt;National Public Fund to Finance Open Source Ecosystem&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  An Inevitable Analysis
&lt;/h2&gt;

&lt;p&gt;The RFI has become an invaluable repository, collecting insights totaling 786 pages from 107 organizations and individuals across the industry, including major technology companies, foundations, research centers, and security firms. The fact that these public responses were limited to roughly ten pages turned out to be a convenient detail.&lt;/p&gt;

&lt;p&gt;As a result, my initial interest in identifying reactions related to my proposal inevitably shifted into a semi-professional, purely manual content analysis.&lt;/p&gt;

&lt;h2&gt;
  
  
  Results
&lt;/h2&gt;

&lt;p&gt;Let's start with sharing the Results document, which should speak for itself:&lt;br&gt;
&lt;a href="https://docs.google.com/spreadsheets/d/1GEG86eB5Eo4CM04RVgvm3i2fiQT8G1aTKWvHpx0pSc8/edit?usp=sharing"&gt;ONCD-2023-0002 - Content Analysis&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Quick items about the document:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The "Notes" of each column contains the descriptions and alternative keywords.&lt;/li&gt;
&lt;li&gt;If available, the "Notes" of a cell includes the paragraph related to the keyword.&lt;/li&gt;
&lt;li&gt;✖ indicates "False positive" or "Not applicable".&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Methodology
&lt;/h2&gt;

&lt;p&gt;All responses were converted to PDF and organized under a folder on Google Drive. Utilizing Google Drive's full-text search functionality proved more efficient than relying solely on the Regulations website.&lt;/p&gt;

&lt;p&gt;Feel free to refer to the Google Drive folder and download the responses:&lt;br&gt;
&lt;a href="https://drive.google.com/drive/folders/10mRyxI-ytloMeSt2RKFwz3E2HkGcRTuJ?usp=sharing"&gt;ONCD-2023-0002 - Content Analysis - Responses&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Steps
&lt;/h3&gt;

&lt;p&gt;Here is the list of steps I took to produce the results.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Start with a text search on Google Drive.&lt;/li&gt;
&lt;li&gt;Mark the responses in the sheet.&lt;/li&gt;
&lt;li&gt;Review the marked responses.&lt;/li&gt;
&lt;li&gt;Determine True/False positives and categorize results accordingly.&lt;/li&gt;
&lt;li&gt;Take note of Highlights and newly revealed keywords during the review.&lt;/li&gt;
&lt;li&gt;Iterate through the steps to improve the coverage.&lt;/li&gt;
&lt;/ol&gt;

&lt;h3&gt;
  
  
  No ChatGPT 🤷‍♂️
&lt;/h3&gt;

&lt;p&gt;While ChatGPT could have been an excellent tool for analysis and categorization, the initial focus was on identifying and reviewing similar responses, and the analytical part unexpectedly evolved. When it became clear ChatGPT could be handy, I had already completed most of the work and didn't want to integrate it in the later stages to maintain consistency. So, next time, Chad!&lt;/p&gt;

&lt;h2&gt;
  
  
  Categories &amp;amp; Keywords
&lt;/h2&gt;

&lt;p&gt;Below is the list of the categories, associated keywords, and how many different responses they appear in. In the document, please check the "Notes" of each column to see the details and alternative keywords in the document.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Definitions:&lt;/strong&gt; Which keywords does the response refer to when describing OSS?&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Volunteer:&lt;/strong&gt; 22 responses&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Public good:&lt;/strong&gt; 14 responses&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Solutions:&lt;/strong&gt; Which solutions does the response recommend?&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Government funding:&lt;/strong&gt; 37 responses&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Procurement:&lt;/strong&gt; 8 responses&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Tax credits:&lt;/strong&gt; 7 responses&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Government OSPO:&lt;/strong&gt; 4 responses&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Systemic issues:&lt;/strong&gt; Which systemic issues does the response mention?&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Underfunded:&lt;/strong&gt; 12 responses&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Free rider:&lt;/strong&gt; 6 responses&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Bureaucracy:&lt;/strong&gt; 4 responses&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cyber Resilience Act:&lt;/strong&gt; 11 responses&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Organizations:&lt;/strong&gt; Which organizations does the response mention?&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;OpenSSF:&lt;/strong&gt; 23 responses&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;OWASP:&lt;/strong&gt; 12 responses&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Sovereign Tech Fund:&lt;/strong&gt; 10 responses&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Open Technology Fund:&lt;/strong&gt; 7 responses&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Open Source Initiative:&lt;/strong&gt; 6 responses&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Quick Takes
&lt;/h2&gt;

&lt;p&gt;I may write follow-up articles to expand my findings about the analysis, coupled with specifics of why we should establish dedicated public funds to finance open technologies and challenges around these initiatives.&lt;/p&gt;

&lt;p&gt;For now, I will briefly share my initial remarks about the results.&lt;/p&gt;

&lt;h3&gt;
  
  
  Growing Demand for Public Funding
&lt;/h3&gt;

&lt;p&gt;Compared to the previous conversations on financing open technologies, it is promising to see public funding being promoted as a feasible solution by numerous organizations. Degrees and conditions vary, but out of 108, 37 responses suggest government funding as a way to strengthen the open source ecosystem, including big tech companies like Amazon, Google, and Microsoft.&lt;/p&gt;

&lt;p&gt;Following these recommendations, it may not be a surprising outcome if the US Government decides to form a dedicated public fund for open source – a significant impact on the ecosystem.&lt;/p&gt;

&lt;h3&gt;
  
  
  Charity or Business
&lt;/h3&gt;

&lt;p&gt;On the flip side, open source software is still predominantly defined as volunteer work rather than potentially a business activity that generates substantial economic value. The term "volunteer" or alternatives appear together with open source software in 22 responses—similarly, only a few mention open technologies' social and economic benefits.&lt;/p&gt;

&lt;p&gt;This outcome might be understandable since the RFI primarily focuses on security. Still, is it a sign that we should work on our elevator pitch for open tech across the board and emphasize its connections with real-world challenges?&lt;/p&gt;

&lt;h3&gt;
  
  
  Successful organizations
&lt;/h3&gt;

&lt;p&gt;Under the Organizations category, The Open Source Security Foundation (OpenSSF), established under the Linux Foundation only three years ago, stands out prominently. Undoubtedly, the RFI is perfectly in line with its scope, yet it was mentioned in 23 responses numerous times, making it the most referenced organization.&lt;/p&gt;

&lt;p&gt;Similarly, despite being just one year old, the Sovereign Tech Fund has been cited as a model in almost all instances where dedicated public funding has been proposed.&lt;/p&gt;

&lt;p&gt;A closer look at the ingredients of these organizations might be good homework, giving us valuable insights.&lt;/p&gt;

&lt;h2&gt;
  
  
  Potential Improvements
&lt;/h2&gt;

&lt;p&gt;Once you start digging such a mine, you constantly conjure new ideas. These are my notes on potential updates to extend the analysis.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Demographics of Response Owners:&lt;/strong&gt;

&lt;ul&gt;
&lt;li&gt;Include a breakdown of response owners' demographics, determining individuals, foundations, universities, and corporations.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Collect Links for Referenced Sources:&lt;/strong&gt;

&lt;ul&gt;
&lt;li&gt;Gather links mentioned in the responses to identify the most referenced sources.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Expand Categories:&lt;/strong&gt;

&lt;ul&gt;
&lt;li&gt;Introduce the "Incidents" category together with notable events, such as "Log4Shell," "Heartbleed," or "Solarwinds."&lt;/li&gt;
&lt;li&gt;Introduce the "Digital Infrastructure/Software Supply Chain" keywords under the "Definitions" category.&lt;/li&gt;
&lt;li&gt;Introduce the "Central Software Inventory" keyword under the "Solutions" category.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Optimize Existing Keywords:&lt;/strong&gt;

&lt;ul&gt;
&lt;li&gt;Improve the "Bureaucracy" by including additional keywords such as "regulations" and "mandates" for a more extensive analysis.&lt;/li&gt;
&lt;li&gt;Restructure the "Volunteer" keyword into "Who is Producing and Maintaining OSS," and improve the clarity by identifying Volunteers, Foundations, and Corporations.&lt;/li&gt;
&lt;li&gt;Refine the "Government Funding" category to address items falling on either the "Strong" or "Weak" sides for better categorization.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Highlights
&lt;/h2&gt;

&lt;p&gt;You can continue with &lt;a href="https://dev.to/coni2k/the-us-government-open-source-software-and-analyzing-786-pages-of-responses-highlights-54ii"&gt;the second article&lt;/a&gt;, where I share over forty highlights that got my attention while reviewing the responses. It's a compilation of quotes from 25 organizations, including major technology companies, well-known foundations, universities, and security firms.&lt;/p&gt;

&lt;h2&gt;
  
  
  Feedback
&lt;/h2&gt;

&lt;p&gt;As usual, your feedback is priceless! Do you have any suggestions or questions? Please don't hesitate to share them under this article or directly in the document.&lt;/p&gt;

</description>
      <category>opensource</category>
      <category>techpolicy</category>
    </item>
    <item>
      <title>Open Source Public Fund experiment - One and a half years update</title>
      <dc:creator>Serkan Holat</dc:creator>
      <pubDate>Thu, 27 Jul 2023 11:27:20 +0000</pubDate>
      <link>https://dev.to/coni2k/open-source-public-fund-experiment-one-and-a-half-years-update-367d</link>
      <guid>https://dev.to/coni2k/open-source-public-fund-experiment-one-and-a-half-years-update-367d</guid>
      <description>&lt;h2&gt;
  
  
  Sponsored by
&lt;/h2&gt;

&lt;p&gt;First, the exciting news: I am delighted to share that I started working with the &lt;a href="https://www.oscollective.org/" rel="noopener noreferrer"&gt;Open Source Collective&lt;/a&gt; and &lt;a href="https://ecosyste.ms/" rel="noopener noreferrer"&gt;Ecosyste.ms&lt;/a&gt; teams on this research, and the Open Source Collective is the sponsor of the following updates.&lt;/p&gt;

&lt;p&gt;Hopefully more to come on this collaboration, so stay tuned!&lt;/p&gt;

&lt;h2&gt;
  
  
  Unresolved question: How should open technologies be financed?
&lt;/h2&gt;

&lt;p&gt;When it comes to open technologies, such as open source software, there is a long-standing debate about how to finance them and by whom.&lt;/p&gt;

&lt;p&gt;My humble conclusion is straightforward. Expecting thousands of companies to contribute back to the ecosystems they consume without coordination is a hopeless dead end. Open technologies fall under the public goods category; therefore, we should finance them with public money, similar to public roads, bridges, or libraries.&lt;/p&gt;

&lt;p&gt;However, the nature of open technologies is pushing us to innovate over our funding models; even though we should recognize them as a new type of digital, public goods, they are produced by the private sector, which is a combination that happens for the first time on a large and continues scale.&lt;/p&gt;

&lt;p&gt;This unique state brings us a new challenge; developing a scalable public funding structure to finance an entire and ever-changing market.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5fvf0w2h55abaxzdwill.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5fvf0w2h55abaxzdwill.jpg" alt="The epic handshake meme on how open technologies should be financed through the private sector and agile public funding combo💪" width="697" height="500"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Last year, I started an &lt;a href="https://dev.to/coni2k/open-source-public-fund-experiment-lc8"&gt;Agile Public Fund experiment&lt;/a&gt; to dive into the practical side of this challenge; study and demo a funding algorithm that distributes a certain amount to open source initiatives based on criticality and usage metrics. The journey continues with new allies, some updates, and with more challenges to come.&lt;/p&gt;

&lt;p&gt;As usual, your feedback is priceless; don't hesitate to get in touch with any comments, questions, or ideas.&lt;/p&gt;

&lt;h2&gt;
  
  
  Updates
&lt;/h2&gt;

&lt;p&gt;I had a chance to improve the data, process, and algorithms in the last couple of weeks. You can see all the changes on the &lt;a href="https://docs.google.com/spreadsheets/d/1JsSie6KiIV7DZttjy5CocKY-SZkxOvLVVbOJlM8SIYU/edit?usp=sharing" rel="noopener noreferrer"&gt;Open source public fund experiment&lt;/a&gt; document on Google Sheets.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;TL;DR&lt;/strong&gt;: I could extend the &lt;a href="https://github.com/ossf/criticality_score" rel="noopener noreferrer"&gt;Criticality Score&lt;/a&gt; algorithm with usage metrics from &lt;a href="https://ecosyste.ms/" rel="noopener noreferrer"&gt;Ecosyste.ms API&lt;/a&gt; and apply it to all open source accounts under the &lt;a href="https://opencollective.com/" rel="noopener noreferrer"&gt;Open Collective&lt;/a&gt;, so we have a new ranking now! I also made it possible to change the weights of each parameter so that you can try the algorithm by yourself.&lt;/p&gt;

&lt;h3&gt;
  
  
  Open Collective data refresh
&lt;/h3&gt;

&lt;p&gt;Refreshed the accounts list from Open Collective API and included the country and yearly budget in the data. There are now 4729 accounts with a code repository.&lt;/p&gt;

&lt;h3&gt;
  
  
  Criticality Score's latest version
&lt;/h3&gt;

&lt;p&gt;Updated my local Criticality Score repository to the latest version. The new version is written in the Go language instead of Python, and it has a second algorithm that calculates the score by getting the "dependent count" data from the &lt;a href="//deps.dev"&gt;Open Source Insights (deps.dev)&lt;/a&gt; API.&lt;/p&gt;

&lt;h3&gt;
  
  
  Manual score calculations
&lt;/h3&gt;

&lt;p&gt;Recreated all formulas for calculating the scores under the "Criticality Score - Results" sheet. Now it is possible to play around with the weight of each parameter and see the new results directly within the document.&lt;/p&gt;

&lt;h3&gt;
  
  
  New config with the Ecosyste.ms data
&lt;/h3&gt;

&lt;p&gt;Decoupling the data collection and the score calculation made extending the data from other custom resources easy. Thus, I retrieved each repository's "dependent_repos_count" data from the Ecosyste.ms API and created a new algorithm configuration. This one replaces the deps.dev's "dependent count" parameter.&lt;/p&gt;

&lt;p&gt;Now there are three different algorithms for score calculation, and you can see their parameters under the "Criticality Score - Config" sheet:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;original_pike - Yellow: The default algorithm from the Criticality Score.&lt;/li&gt;
&lt;li&gt;pike_deps.dev - Green: The second algorithm from the Criticality Score includes the "dependent count" from deps.dev as an extra parameter.&lt;/li&gt;
&lt;li&gt;ecosyste.ms - Blue: The new algorithm that uses the "dependent_repos_count" data from the Ecosyste.ms API and replaces the deps.dev's "dependent count" parameter.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Changing a parameter under the Config sheet updates the scores under the Results. Feel free to copy the document and try it yourself.&lt;/p&gt;

&lt;h3&gt;
  
  
  Stats
&lt;/h3&gt;

&lt;p&gt;Under the new Stats sheet, you can see a quick overview of the data in the other sheets:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;General stats of the Open Collective accounts and repositories&lt;/li&gt;
&lt;li&gt;Budget stats of the accounts&lt;/li&gt;
&lt;li&gt;The languages of the repositories&lt;/li&gt;
&lt;li&gt;The licenses of the repositories&lt;/li&gt;
&lt;li&gt;The countries of the accounts&lt;/li&gt;
&lt;li&gt;The ecosystems of the repositories&lt;/li&gt;
&lt;li&gt;Top 10 repositories of each algorithm&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://docs.google.com/spreadsheets/d/1JsSie6KiIV7DZttjy5CocKY-SZkxOvLVVbOJlM8SIYU/edit?usp=sharing" rel="noopener noreferrer"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fo7735i77r8yympqzvadn.png" alt="Stats sheet screenshot" width="649" height="778"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Winners
&lt;/h3&gt;

&lt;p&gt;This sheet shows the history and the details of the three winners I randomly choose monthly to test the algorithm.&lt;/p&gt;

&lt;h3&gt;
  
  
  Budgets
&lt;/h3&gt;

&lt;p&gt;I plan to follow the budget changes of the Open Collective accounts in time under this new sheet.&lt;/p&gt;

&lt;h3&gt;
  
  
  The process and the helper tools
&lt;/h3&gt;

&lt;p&gt;Below is a brief list of actions to prepare the data and the final results. One critical remark is that currently, the process only works with GitHub repositories, so I exclude non-GitHub ones—hopefully, a detail to improve in the future.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Retrieve the accounts data from Open Collective API to create Accounts and Budgets sheets,&lt;/li&gt;
&lt;li&gt;Call GitHub API to find the most starred repositories of each GitHub user, which you can find under the "GitHub - Top repos" sheet,&lt;/li&gt;
&lt;li&gt;Run the Criticality Tool to get the data points of each repository, which are stored under the "Criticality Score - Results" sheet,&lt;/li&gt;
&lt;li&gt;Call the Lookup endpoint of the Ecosyste.ms API to get the additional "dependent_repos_count" data of each repository and combine it with the other parameters under the "Criticality Score - Results" sheet,&lt;/li&gt;
&lt;li&gt;Once the data is in place, the existing formulas in the "Criticality Score - Results" sheet calculate the scores.&lt;/li&gt;
&lt;li&gt;Last, I will be updating the data and the scores once a month.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Quick links:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://docs.opencollective.com/help/contributing/development/api" rel="noopener noreferrer"&gt;Open Collective API&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/coni2k/OpenSourcePublicFundExperiment/" rel="noopener noreferrer"&gt;Helper repository to collect and process the data&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/coni2k/criticality_score" rel="noopener noreferrer"&gt;My Criticality Score fork&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Stats overview
&lt;/h2&gt;

&lt;p&gt;Here are some stats that stand out:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The total number of Open Collective accounts with a code repository is 4729.&lt;/li&gt;
&lt;li&gt;96.32% of those accounts use GitHub as their code repository.&lt;/li&gt;
&lt;li&gt;However, 15.38% of the GitHub username are not valid / don't exist, which is a massive number. It would be handy if Open Collective could add a code repository/link verification method or ask the users to update their profile details occasionally.&lt;/li&gt;
&lt;li&gt;81.62% of the accounts use USD as their currency. Their yearly budget is about $15 million, and the average is $3,887 per account, probably not even one percent of the ideal figures.&lt;/li&gt;
&lt;li&gt;The language of almost one-third of the repositories is JavaScript. Python comes second, and PHP is third.&lt;/li&gt;
&lt;li&gt;MIT dominates the license list with 41.91%, of which there are 27 different licenses. 15.41% of the repositories don't have any.&lt;/li&gt;
&lt;li&gt;Regarding the accounts' countries, the United States leads the list with 11.4%. China follows with 2.9%, the United Kingdom at 2.8%, Germany at 2.7%, and India at 2.5%.&lt;/li&gt;
&lt;li&gt;The Ecosyste.ms search returns 1453 matches out of 3336 unique repositories. Out of this data, npm is the top ecosystem with 46.94%, go is the second with 13.35%, and PyPI is third with 9.70%.&lt;/li&gt;
&lt;li&gt;And last, here are the top five repositories with the highest criticality score based on Ecosyste.ms config:

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/babel/babel" rel="noopener noreferrer"&gt;https://github.com/babel/babel&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/facebook/react" rel="noopener noreferrer"&gt;https://github.com/facebook/react&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/Automattic/mongoose" rel="noopener noreferrer"&gt;https://github.com/Automattic/mongoose&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/typescript-eslint/typescript-eslint" rel="noopener noreferrer"&gt;https://github.com/typescript-eslint/typescript-eslint&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/numpy/numpy" rel="noopener noreferrer"&gt;https://github.com/numpy/numpy&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;

&lt;p&gt;You can see the full ranking of each algorithm and more under the Stats sheet.&lt;/p&gt;

&lt;h2&gt;
  
  
  Winners overview
&lt;/h2&gt;

&lt;p&gt;I randomly choose three open source collectives from the accounts list every month to test the algorithm results and reach out to the open source entrepreneurs. I distribute an amount to each collective based on their scores.&lt;/p&gt;

&lt;p&gt;Since the start, it's been 19 rounds, and using experiment as my excuse, I have proudly invested &lt;a href="https://opencollective.com/coni2k" rel="noopener noreferrer"&gt;$4259 in 57 open source collectives&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;As a side experiment, I determine the amount to distribute based on new social media followers. Six months ago, I included Mastodon and LinkedIn next to Twitter and gained 178 followers on all three platforms since then.&lt;/p&gt;

&lt;h2&gt;
  
  
  What's next?
&lt;/h2&gt;

&lt;p&gt;In short, a lot! Next to telling a more compelling story about why we should invest in open technologies and why public money is the best option to achieve that, there are many practical items on the list:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Most under-appreciated: Find the accounts with the highest score and minimum yearly budget,&lt;/li&gt;
&lt;li&gt;Permissive the better: Categorize permissive and copy-left licenses and add a license parameter to the algorithm as an experiment (feedback is welcome),&lt;/li&gt;
&lt;li&gt;Repositories vs. releases: Combine the repository data with their release information and improve the algorithm by including the release metrics.&lt;/li&gt;
&lt;li&gt;National public funds simulation: Categorize the accounts based on each country and simulate fund distribution per country.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Thanks for tuning in, and I hope you enjoy the ride as much as I do. Wish me luck, and see you next time!&lt;/p&gt;

</description>
      <category>opensource</category>
      <category>agilepublicfunds</category>
    </item>
    <item>
      <title>Open Source Public Fund experiment</title>
      <dc:creator>Serkan Holat</dc:creator>
      <pubDate>Mon, 03 Jan 2022 14:18:00 +0000</pubDate>
      <link>https://dev.to/coni2k/open-source-public-fund-experiment-lc8</link>
      <guid>https://dev.to/coni2k/open-source-public-fund-experiment-lc8</guid>
      <description>&lt;ul&gt;
&lt;li&gt;One-year review - &lt;a href="https://www.linkedin.com/feed/update/urn:li:activity:7022915965306712064/" rel="noopener noreferrer"&gt;LinkedIn&lt;/a&gt; | &lt;a href="https://mastodon.social/@coni2k/109733093583681242" rel="noopener noreferrer"&gt;Mastodon&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Six-month review - &lt;a href="https://twitter.com/coni2k/status/1543986591286321152" rel="noopener noreferrer"&gt;Twitter&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;strong&gt;Question:&lt;/strong&gt; You have 100 money. How would you distribute this amount across the entire open source ecosystem?&lt;/p&gt;

&lt;h2&gt;
  
  
  Motivations: Free and Open Source World
&lt;/h2&gt;

&lt;p&gt;For over two decades, I have been working across different industries, helping companies develop primarily internal but always proprietary software solutions, which is long enough to recognize the inefficiencies of closed technologies at scale.&lt;/p&gt;

&lt;p&gt;One practice that was relatively easy to observe is the development of similar applications in different companies, a collective habit that leads to the constant reinvention of the wheel.&lt;/p&gt;

&lt;p&gt;On an individual basis, it is logical for companies to keep the output of their investment to themselves. However, once that behavior becomes a pattern among all companies producing technology, it becomes an obstacle to reusing existing solutions. Short-term individual gains lead to collective losses.&lt;/p&gt;

&lt;p&gt;This realization made me curious about open source software. I have spent the last few years researching its sustainability, focusing on business and funding models.&lt;/p&gt;




&lt;p&gt;I envision a future where we collectively build most of our technology solutions in the open, whether software, hardware, AI, or otherwise. A scenario in which companies and individuals constantly reuse and innovate each other's work. How would minimizing repetitive solutions and combining expensive engineering resources impact our technological progress and societal challenges, such as achieving the United Nations' Sustainable Development Goals?&lt;/p&gt;

&lt;p&gt;However, a missing ingredient in achieving this future is aligning incentives for businesses to keep contributing to the open technology ecosystem.&lt;/p&gt;

&lt;p&gt;Since I want to keep this article short and focused on the experiment, here is a summary of my conclusions:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;* Open technologies, such as open source software, generate substantial value for our economies and require a steady stream of revenue in return.&lt;/li&gt;
&lt;li&gt;Due to coordination issues and lack of contracts, the businesses that consume open technologies cannot return that revenue to the ecosystem, a.k.a. the &lt;a href="https://www.investopedia.com/terms/f/free_rider_problem.asp" rel="noopener noreferrer"&gt;Free Rider Problem&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;As a solution, we should,&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Recognize open technologies as a new type of digital public good,&lt;/li&gt;
&lt;li&gt;Finance the ecosystem by setting up national or global public funds and generating a direct income for organizations producing open technologies based on their products' usage and criticality metrics,&lt;/li&gt;
&lt;li&gt;And aim to establish a financially sustainable digital public goods market in the long run.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Agile Public Funds
&lt;/h3&gt;

&lt;p&gt;To achieve scalability in this structure, our public funding models must align with the unique characteristics of these new digital goods.&lt;/p&gt;

&lt;p&gt;Traditional funding options, such as one-time grants, may work well for single, long-term projects but are unsuitable for a fast-paced ecosystem like software development.&lt;/p&gt;

&lt;p&gt;Instead, we should establish scalable public funds that distribute resources across the entire ecosystem, evaluating each solution's past success using specific metrics.&lt;/p&gt;

&lt;p&gt;I aim to study and demonstrate the practicality of an Agile Funding model through this personal experiment.&lt;/p&gt;

&lt;h2&gt;
  
  
  Process
&lt;/h2&gt;

&lt;p&gt;I have created a document containing all available open source collectives:&lt;br&gt;
&lt;a href="https://docs.google.com/spreadsheets/d/1JsSie6KiIV7DZttjy5CocKY-SZkxOvLVVbOJlM8SIYU/edit?usp=sharing" rel="noopener noreferrer"&gt;Open source public fund experiment&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://docs.google.com/spreadsheets/d/1JsSie6KiIV7DZttjy5CocKY-SZkxOvLVVbOJlM8SIYU/edit?usp=sharing" rel="noopener noreferrer"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9b7nwvuy76zwcxjda6v4.png" alt="Open source public fund experiment document screenshot" width="516" height="608"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;With your help, I will randomly choose three open source collectives every month from this list.&lt;/li&gt;
&lt;li&gt;Find each collective's "most popular" repository on GitHub by using the number of Stars. I want to pick a single repository only to keep the process simple.&lt;/li&gt;
&lt;li&gt;Calculate each repo's score and weight using the Criticality Score tool.&lt;/li&gt;
&lt;li&gt;Distribute that month's amount to the projects based on these results through Open Collective, preferably on the first day of each month.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;I will keep updating the document in the coming period, so please check it to see the selected projects, scores, weights, and final amounts.&lt;/p&gt;

&lt;h2&gt;
  
  
  Monthly Amount
&lt;/h2&gt;

&lt;p&gt;I will tie the monthly amount to the &lt;a href="https://mastodon.social/@coni2k" rel="noopener noreferrer"&gt;new&lt;/a&gt; &lt;a href="https://www.linkedin.com/in/serkanholat" rel="noopener noreferrer"&gt;follower&lt;/a&gt; &lt;a href="https://twitter.com/coni2k" rel="noopener noreferrer"&gt;count&lt;/a&gt; to keep the numbers dynamic and invest a certain amount for each follower. You can check the document to see how I calculate the amount for each month.&lt;/p&gt;

&lt;h2&gt;
  
  
  Criticality Score
&lt;/h2&gt;

&lt;p&gt;I will use the &lt;a href="https://opensource.googleblog.com/2020/12/finding-critical-open-source-projects.html" rel="noopener noreferrer"&gt;Criticality Score&lt;/a&gt; tool from the Open Source Security Foundation (OpenSSF) as a base, calculate a score for each selected project, and distribute our small fund based on the results.&lt;/p&gt;

&lt;p&gt;I plan to improve the contribution algorithm in time. It is important to note we currently miss the "usage" parameter of open-source solutions, which is another crucial parameter we need.&lt;/p&gt;

&lt;p&gt;For more information on the &lt;a href="https://github.com/ossf/criticality_score" rel="noopener noreferrer"&gt;Criticality Tool&lt;/a&gt;, please check its repo.&lt;/p&gt;

&lt;h2&gt;
  
  
  Open Collective
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://opencollective.com/" rel="noopener noreferrer"&gt;Open Collective&lt;/a&gt; is a platform that provides legal and financial support for grassroots communities, including for a large number of open source projects. Its transparent structure makes it easy to &lt;a href="https://opencollective.com/coni2k" rel="noopener noreferrer"&gt;verify the payments&lt;/a&gt;, so I chose to use it as a payment platform.&lt;/p&gt;

&lt;p&gt;I retrieve the "accounts" data from their public API and process the rest based on this dataset.&lt;/p&gt;

&lt;p&gt;Quick links:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://docs.opencollective.com/help/contributing/development/api" rel="noopener noreferrer"&gt;Open Collective API&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/coni2k/OpenSourcePublicFundExperiment/" rel="noopener noreferrer"&gt;Helper repository to collect and process the data&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/coni2k/criticality_score" rel="noopener noreferrer"&gt;My Criticality Score fork&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://docs.google.com/spreadsheets/d/1JsSie6KiIV7DZttjy5CocKY-SZkxOvLVVbOJlM8SIYU/edit?usp=sharing" rel="noopener noreferrer"&gt;Open source public experiment document&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Don't hesitate to ask me any questions about the data, tools, or the process.&lt;/p&gt;

&lt;h2&gt;
  
  
  Feedback
&lt;/h2&gt;

&lt;p&gt;As usual, please feel free to share your thoughts and questions. I will do my best to improve the process based on your feedback.&lt;/p&gt;

</description>
      <category>opensource</category>
      <category>agilepublicfunds</category>
    </item>
  </channel>
</rss>
