Home Open Sauce Red Hat is open – to doing business with the NSA

Author's Opinion

The views in this column are those of the author and do not necessarily reflect the views of iTWire.

Have your say and comment below.

Red Hat's annual summit held last week was a smörgåsbord of events that illustrate what the company styles as its philosophy of openness. In the rush to publicise this trait, the company forgot that it is aiding the NSA, the biggest spy outfit in the world, to snoop on others.

There is no way anyone would define that role as contributing to openness. It could, of course, open up the possibility that innocent people could be arrested for very trivial things.

In 2015, it was reported that XKEYSCORE — an application that the Intercept describes as the NSA's Google for private communications — was being run for the most part on Red Hat Linux servers.

But when one asks Red Hat about this, one realises pretty soon that there are limits to the company's definition of openness.

To believe the excuse offered — that a company which earns in excess of US$2 billion in revenue cannot find a spokesman to comment — one has to be very, very naive.

Red Hat was all over the word "open" last week, even cynically exploiting brain cancer patients by pointing to two people who had shared data about themselves and used their plight to begin a movement.

Exactly what this has to do with the selling of software is not clear.

But many companies, some of which can only be described as charlatans, have used the same ruse. Some use the term "open core" to sell proprietary software by wrapping it around some nominally open source code.

The word "open" is used as a marketing tool more often than not by companies who will do anything to make a buck.

However, the true test of any company's commitment to an open philosophy comes when it has to deal with tricky issues, things that paint it in a light that is not flattering.

Red Hat fails on this score; it is helping the NSA to spy on the entire US population and also a goodly portion of the remainder of the human race.

Given the licence under which the Linux kernel is released, nobody could object if the NSA used a GNU/Linux distribution that was available for free download – as many are.

But when it comes to a company that earns every penny from free and open source software providing support and updates for what is clearly an unethical activity, one has to draw the line.

The very fact that Red Hat refuses to say anything about its NSA contracts when asked, is an indication that the company is uncomfortable about it.

Nobody is asking Red Hat to be a paragon of virtue; that would be impossible if one wishes to do business while being based in the US. Or, indeed, anywhere else.

Red Hat is not a basket case that needs to depend on the NSA's cash; it can easily do without. That it continues to take the NSA's 30 pieces of silver without flinching is an indication of a company that has one philosophy for public use and another for deals done in private.

47 REASONS TO ATTEND YOW! 2018

With 4 keynotes + 33 talks + 10 in-depth workshops from world-class speakers, YOW! is your chance to learn more about the latest software trends, practices and technologies and interact with many of the people who created them.

Speakers this year include Anita Sengupta (Rocket Scientist and Sr. VP Engineering at Hyperloop One), Brendan Gregg (Sr. Performance Architect Netflix), Jessica Kerr (Developer, Speaker, Writer and Lead Engineer at Atomist) and Kent Beck (Author Extreme Programming, Test Driven Development).

YOW! 2018 is a great place to network with the best and brightest software developers in Australia. You’ll be amazed by the great ideas (and perhaps great talent) you’ll take back to the office!

Register now for YOW! Conference

· Sydney 29-30 November
· Brisbane 3-4 December
· Melbourne 6-7 December

Register now for YOW! Workshops

· Sydney 27-28 November
· Melbourne 4-5 December

REGISTER NOW!

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the sitecame into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

 

Popular News

 

Telecommunications

 

Sponsored News

 

 

 

 

Connect