The Times Australia
The Times World News

.
The Times Real Estate

.

'Protestware' is on the rise, with programmers self-sabotaging their own code. Should we be worried?

  • Written by Christoph Treude, Senior Lecturer in Software Engineering, The University of Melbourne
'Protestware' is on the rise, with programmers self-sabotaging their own code. Should we be worried?

In March 2022, the author of node-ipc[1], a software library with over a million weekly downloads[2], deliberately broke their code[3]. If the code discovers it is running within Russia or Belarus, it attempts to replace the contents of every file on the user’s computer with a heart emoji.

A software library is a collection of code other programmers can use for their purposes. The library node-ipc is used by Vue.js[4], a framework that powers millions of websites for businesses such as Google, Facebook, and Netflix.

This critical security vulnerability[5] is just one example of a growing trend[6] of programmers self-sabotaging their own code for political purposes. When programmers protest through their code – a phenomenon known as “protestware” – it can have consequences for the people and businesses who rely on the code they create.

Different forms of protest

My colleague Raula Gaikovina Kula[7] and I have identified[8] three main types of protestware.

Malignant protestware is software that intentionally damages or takes control of a user’s device without their knowledge or consent.

Benign protestware is software created to raise awareness about a social or political issue, but does not damage or take control of a user’s device.

Developer sanctions are instances of programmers’ accounts being suspended[9] by the internet hosting service[10] that provides them with a space to store their code and collaborate with others.

Modern software systems are prone to vulnerabilities because they rely on third-party libraries. These libraries are made of code that performs particular functions, created by someone else. Using this code lets programmers add existing functions into their own software without having to “reinvent the wheel[11]”.

The use of third-party libraries is common[12] among programmers – it speeds up the development process and reduces costs. For example, libraries listed in the popular NPM registry[13], which contains more than 1 million libraries, rely on an average of five to six[14] other libraries from the same ecosystem[15]. It’s like a car manufacturer who uses parts from other manufacturers to complete their vehicles.

These libraries are typically maintained by one or a handful of volunteers and made available to other programmers for free under an open-source software license.

The success of a third-party library is based on its reputation among programmers. A library builds its reputation over time, as programmers gain trust in its capabilities and the responsiveness of its maintainers to reported defects and feature requests.

If third-party library weaknesses are exploited, it could give attackers access to a software system. For example, a critical security vulnerability[16] was recently discovered in the popular Log4j[17] library. This flaw could allow a remote attacker to access sensitive information that was logged by applications using Log4j – such as passwords or other sensitive data.

What if vulnerabilities are not created by an attacker looking for passwords, but by the programmer themselves with the intention to make users of their library aware of a political opinion? The emergence of protestware is giving rise to such questions, and responses are mixed.

Read more: What is Log4j? A cybersecurity expert explains the latest internet vulnerability, how bad it is and what's at stake[18]

Ethical questions abound

A blog post[19] on the Open Source Initiative site[20] responds to the rise of protestware stating “protest is an important element of free speech that should be protected” but concludes with a warning:

“The downsides of vandalising open source projects far outweigh any possible benefit, and the blowback will ultimately damage the projects and contributors responsible.”

What is the main ethical question behind protestware? Is it ethical to make something worse in order to make a point? The answer to this question largely depends on the individual’s personal ethical beliefs.

Some people may see the impact of the software on its users and argue protestware is unethical if it’s designed to make life more difficult for them. Others may argue that if the software is designed to make a point or raise awareness about an issue, it may be seen as more ethically acceptable.

From a utilitarian perspective, one might argue that if a form of protestware is effective in bringing about a greater good (such as political change), then it can be morally justified.

From a technical standpoint, we are developing ways to automatically detect and counteract protestware. Protestware would be an unusual[21] or surprising[22] event in the change history of a third-party library. Mitigation is possible through redundancies – for example, code that is similar or identical to other code in the same or different libraries.

The rise of protestware is a symptom of a larger social problem. When people feel they are not being heard, they may resort to different measures to get their message across. In the case of programmers, they have the unique ability to protest through their code.

While protestware may be a new phenomenon, it is likely here to stay. We need to be aware of the ethical implications of this trend and take steps to ensure software development remains a stable and secure field.

We rely on software to run our businesses and our lives. But every time we use software, we’re putting our trust in the people who wrote it. The emergence of protestware threatens to destabilise this trust if we don’t take action.

Read more: What does the Optus data breach mean for you and how can you protect yourself? A step-by-step guide[23]

References

  1. ^ node-ipc (riaevangelist.github.io)
  2. ^ over a million weekly downloads (www.npmjs.com)
  3. ^ broke their code (techcrunch.com)
  4. ^ Vue.js (vuejs.org)
  5. ^ critical security vulnerability (cve.mitre.org)
  6. ^ growing trend (research.unimelb.edu.au)
  7. ^ Raula Gaikovina Kula (raux.github.io)
  8. ^ have identified (arxiv.org)
  9. ^ suspended (www.jessesquires.com)
  10. ^ internet hosting service (github.com)
  11. ^ reinvent the wheel (arxiv.org)
  12. ^ is common (arxiv.org)
  13. ^ NPM registry (www.npmjs.com)
  14. ^ five to six (arxiv.org)
  15. ^ ecosystem (link.springer.com)
  16. ^ critical security vulnerability (cve.mitre.org)
  17. ^ Log4j (logging.apache.org)
  18. ^ What is Log4j? A cybersecurity expert explains the latest internet vulnerability, how bad it is and what's at stake (theconversation.com)
  19. ^ blog post (blog.opensource.org)
  20. ^ Open Source Initiative site (opensource.org)
  21. ^ unusual (arxiv.org)
  22. ^ surprising (arxiv.org)
  23. ^ What does the Optus data breach mean for you and how can you protect yourself? A step-by-step guide (theconversation.com)

Read more https://theconversation.com/protestware-is-on-the-rise-with-programmers-self-sabotaging-their-own-code-should-we-be-worried-190836

The Times Features

Move over mānuka – here are 5 other delicious native NZ honeys to try this summer

As I write, the summer landscape is bright with pōhutukawa flowers. Sitting in the shade of the “New Zealand Christmas tree”, I can hear bees humming as they move between flowe...

Women are closing in on men when it comes to ultra-endurance events

Men are dominant at most athletic events but ultra-endurance sports (exercising for six hours or more) represent a unique domain where the performance gap between men and women...

Why Expert Plumbing Services Are a Must for Every Aussie Home

Plumbing problems can throw a spanner in the works, especially when you’ve got plans. That’s where calling in an expert plumber makes all the difference. Picture this. You’re firi...

Fast, Fun, And Fantastic Looking Gel Polish For Your Nails!

Today's women spend a lot of time and money on their beauty and fashion regime because they love looking their very best! Looking good makes you feel good, and let's face it, it...

Energy-Efficient Roof Restoration Trends to Watch in Sydney

As climate consciousness rises and energy costs soar, energy-efficient roof restoration has become a significant focus in Sydney. Whether you're renovating an old roof or enhan...

Brisbane Water Bill Savings: Practical Tips to Reduce Costs

Brisbane residents have been feeling the pinch as water costs continue to climb. With increasing prices, it's no wonder many households are searching for ways to ease the burde...

Times Magazine

The Ultimate Guide for Moving for Seniors

Moving is a major activity, regardless of your age. There are a lot of things to manage and schedule, and the older you become, the more you have to think about. You're not alone if you've decided it's time to relocate but are feeling overwhelmed...

Understanding Chemical Storage Cabinets: Importance, Types, and Best Practices

Chemical storage cabinets are essential components in laboratories, industrial facilities, and workplaces that handle hazardous materials. These cabinets are designed to safely store chemicals, minimizing the risk of accidents, spills, and exposure...

Abstract blues and cute otters – the unlikely art of Aussie love

Online dating site eharmony asked 12 regular Australians to paint what love and compatibility looked like, with a view to understanding if stereotypical symbols of love were still relevant, or if they varied greatly across ages and walks of life. ...

The Hottest Trends in Ute Upgrades

There is no doubt about it, Australians love their utes. In recent years the popularity of utes and 4 x 4 vehicles has skyrocketed. Whether you’re an off-road enthusiast or a tradie looking for a work vehicle, these machines have become a part of p...

Apple releases iPhone 14, best deals and perks

Apple has unveiled its next generation tech and the hotly anticipated iPhone 14 with offers from Telstra, Optus and Vodafone up for grabs.Prices for the iPhone 14 line-up start at $1,399 and go up to $2,769.Finder’s Consumer Sentiment Tracker revea...

A Comprehensive Look at the Positive Effects of Magnesium Supplement Australia

Magnesium is one of the most important nutrients that the human body need. It is required for the normal operation of several systems, including the neurological, muscular, and cardiovascular systems. Despite its importance, research suggests that ...

LayBy Shopping