Discourse Is Not Going Closed Source (blog.discourse.org)
223 points by sams99 4 days ago
dhruv3006 4 days ago
> Open source creates a useful urgency: when your code is public, you assume it will be examined closely, so you invest earlier and more aggressively in finding and fixing issues before attackers do.
This should be the mentality of every company doing open source.Great points made.
necovek 4 days ago
This should be a mentality of every company building products :)
TeMPOraL 4 days ago
Indeed. All software products you can get your hands on are open source - compiled code is only little more difficult to read than source code, but not that much if you learn how.
Which is why ~all companies switches to offering software as a service, so this mindset doesn't apply :).
roenxi 4 days ago
finghin 4 days ago
dhruv3006 4 days ago
I guess open source makes you more accountable.
graemep 4 days ago
somewhatgoated 4 days ago
Serhii-Set 4 days ago
[dead]
chrismorgan 4 days ago
> I want to be fair to Cal.com here, because I don’t think they’re acting in bad faith. I just think the security argument is a convenient frame for decisions that are actually about something else. […] Framing a business decision as a security imperative does a disservice to the open-source ecosystem that helped Cal.com get to where they are.
That sure sounds like bad faith to me.
dirkc 4 days ago
This rest of the article contrasts the with "I don’t think they’re acting in bad faith"
This bit stands out to me:
> You can’t take five years of community contributions, close the gate, and claim you’re grateful. I don’t think it works that way.
I think it's safe to say that Sam is not impressed with the the Cal.com decision and the way they framed it.
LoganDark 4 days ago
Bad faith requires you to intend it badly, though, not just for it to be bad.
chrismorgan 4 days ago
Framing a business decision as a security imperative sure sounds like intent to mislead to me.
LoganDark 4 days ago
croes 4 days ago
> dishonest or unacceptable behaviour:
https://dictionary.cambridge.org/dictionary/english/bad-fait...
> I just think the security argument is a convenient frame for decisions that are actually about something else.
That would mean they think it’s bad faith. Claiming to do something because of A but to really do it because of B is dishonest
Gigachad 4 days ago
The above statement is claiming it likely is intended as something bad though. A convenient coverup.
LoganDark 4 days ago
glerk 4 days ago
I've started to opensource my side projects (as long as the code is in a state that I'm not too ashamed of). Seeing how easily I can reverse engineer binaries, clone various applications, and just generally build stuff from scratch with AI assistance, I think there is no moat in hiding your source code. If you can use my code to build something better than me, I wish you the best of luck!
sieabahlpark 4 days ago
[dead]
ramon156 4 days ago
Instead of Microsoft snooping my code, now everyone can!
glerk 4 days ago
I’d rather next models be trained on my code than all that slop that’s out there. Hell really is other people’s code.
shevy-java 4 days ago
"over a decade ago, the repository has been licensed under GPLv2. And that’s not changing"
Well - people can continue the GPLv2 fork anyway. So ultimately what Cal.com would do here does not matter; that's the beauty of GPL in general. It is a strict licence. I think GPLv2 was the better decision for the Linux kernel than, say, BSD/MIT.
> That code is exposed to constant scrutiny from attackers, defenders, researchers, cloud vendors, and maintainers across the globe. It is attacked relentlessly, but it is also hardened relentlessly.
It is clear that there is a business decision with regards to Cal.com jumping away from discourse, but the claim that open source is automatically better than closed source, when it comes to security, is also strange. Remember xz utils backdoor? Now, people noticed this eventually. Ok. How many placed trojans exist that people are unaware about? Perhaps there are more sophisticated backdoors. Perhaps AI is also used to help disguise them. I don't think that merely because something is open source, means it is automatically good or better with regards to security. Can you trust software? In California there are recent censorship bills to restrict 3D printing further, allegedly to curb on plastic guns (but in reality sponsored by lobbyists from the industry). Can a 3D printer print out a 3D printer that is not restricted? Is the state sniffing after people via laws not also a restriction? I guess it is possible to ensure a clean open hardware and open software system acting in tandem. But you kind of have to show that this is the case. See this old discussion about Trust, on reddit: https://old.reddit.com/r/programming/comments/1m4mwn/a_simpl...
fsflover 4 days ago
> the claim that open source is automatically better than closed source, when it comes to security, is also strange. Remember xz utils backdoor?
The XZ attack is an extremely rare event coming likely from a state actor, which actually proves that FLOSS is a big target not easy to attack without huge effort. It was also caught not least thanks to the open nature of the repository. Also, AFAIK it wasn't even a change in the repo itself.
In short, using FLOSS is the way to ensure security. Whenever you touch proprietary staff, be careful and use compartmentalization.
Orygin 4 days ago
Yeah I found this comment to be weird. At least the XZ backdoor was found before it went live anywhere. How many companies were hit by the Solarwind supply chain attacks?
unsungNovelty 4 days ago
> I think GPLv2 was the better decision for the Linux kernel than, say, BSD/MIT.
I differ here. The reason why the corporations run Linux Foundation which pays Linus is cos of this license. Otherwise, they would take what they want and not interfere like they do with FreeBSD and OpenBSD. BSD/MIT leads to better compliance.
The only reason it stays this way is cos Linus owns the trademark. Wait until Linus steps down. Most likely a someone who aligns more with corporates will take charge and you'll see changes then.
If interested - https://www.unsungnovelty.org/posts/05/2023/open-source-proj...
Chaosvex 4 days ago
That's quite the thread. It seems like a good chunk of posters didn't even begin to grasp the point.
TeMPOraL 4 days ago
We're talking about SaaS businesses anyway. Open Source doesn't really matter there - you never actually know what's running on their servers.
fsflover 4 days ago
Unless this is AGPL.
maxloh 4 days ago
cowsup 4 days ago
Great piece. I thought the same of Cal's announcement; it basically boiled down to "we're willing to shift our entire business to a security-through-obscurity approach." It won't be long until systems are sophisticated enough that they can target an application over the course of a weekend, and try thousands of exploits across each possible endpoint you offer, to see what happens, regardless of whether or not your source code is public.
Anyone who's launched anything on the web -- anything at all -- and looked at the logs will see all sorts of endpoints being requested for /wp-admin/ or random WordPress plugins, even if their site has never, and will never, run WordPress. Imagine this at scale, with every possible attack method imaginable, blindly hitting everything on the web. That's where I think we're headed, and closed source won't fix that.
LoganDark 4 days ago
This article raises a lot of good points that strengthen the argument against keeping models away just because they're "too powerful". I remain disappointed to see AI corporations gloating about how powerful their private models are that they're not going to provide to anyone except a special whitelist. That's more likely to give attackers a way in without any possibility for defense, not the other way around.
NitpickLawyer 4 days ago
I think the "too powerful" is a convenient half-truth that also helps with marketing, and more importantly keeps the model from being distilled in the short term. They'll release it "to the masses" after KYC or after they already have the next gen for "trusted partners".
LoganDark 4 days ago
I feel bad for Anthropic because they thought Persona was an acceptable KYC provider. It probably was a genuine mistake. I might have to leave them over that, if they think it's fun to ask me to give Peter Thiel my ID to persist indefinitely on Persona's servers!!!
eaf7e281 4 days ago
> If your code is open source, your security team can scan it, your contributors can scan it, and independent researchers can scan it too.
Literally! If everyone can access the same system as Claude's Mythos, one solution is to have more people trying to identify your issue before the hackers have the chance to do it.
negura 4 days ago
too bad. i wish they would go closedsource so that maybe everyone would stop using it. it's dogshit for countless reasons. including:
- refuses to even load on browser engines older than 2 years. for a webforum that's absolutely appaling. there's a barebones non-JS version. but it only loads for individual threads (not the forum homepage or anything else), so they must be linked to directly (e.g from a websearch engine)
- every single page navigation triggers the circle animation which blocks the view for up to 3 seconds. how is this not an obvious regression on webforum software that has existed for decades?
- various nonsensical functionality suggests an incoherent code base. like the input element for the searchbox disappearing if the browser window loses focus. if you switch tabs midway for whatever reason, you need to reopen the searchbox every time you get back. and you can't use an external editor to fill in the input. because as soon as you've focused the editor, the element that the editor hooked into no longer exists
- search results are crammed in a narrow responsive list with 5 entries. you need to press 'More' to see the rest of the results as yet another responsive list. you never know how many results there are in total. only that there are more than ones that loaded so far
- long threads are never rendered fully. only as incomplete chunks. so it doesn't work to set positional markers in the scroll buffer to jump back and forth. as soon as you scroll past the boundaries of the currently loaded chunk, the old content gets destroyed and replaced. it feels like having alzheimer's
- you can reply to any specific post in a thread and there will be a visual indicator about which post you replied to. except if you reply to the most recent post in a thread. so someones who reads a post has no way of knowing in advance whether it is being addressed to the post just above it, or to the thread as a whole
i hate discourse so much. i'll never understand why it got so much adoption by FOSS communities. it must be the virtue signalling
eaf7e281 4 days ago
I'm not sure where this heat comes from, but what constitutes a "good" forum in your opinion? I would love to check it out.
undefined 3 days ago
baud147258 4 days ago
while I've just been on forums that have been using xenoforo, I found it a better experience than those running Discourse
LorenDB 4 days ago
Cthulhu_ 4 days ago
These are various reasons why I also opted to not use it when it was finally time to retire vBulletin 3. We never did adopt vB 4 or 5, because while I'm sure the code was "better" from a software engineering perspective (using classes/OOP etc), it was also noticably slower, and the original developers had either been ousted or sold out.
The original vB developers built Xenforo, which is still in the spirit of vB 3 but with some modern amenities like live updates and the like.
I also found Discourse to be... challenging to self-host.
karussell 4 days ago
> I also found Discourse to be... challenging to self-host.
Made a completely different experience. Every once in a while you have to run a command. Over the last 10-12 years there were I think 2 problems where this did not work out of the box.
LorenDB 4 days ago
You forgot one of the worst parts: the Discobot that tries to make you run through a tutorial every. single. time. you sign up for a Discourse forum.
negura 4 days ago
yes! another one i forgot: all the bullshit notifications about level promotions, earning badges and "thanks for spending time with us" inbox spam.
undefined 4 days ago
nixosbestos 4 days ago
> must be the virtue signalling
I wish you folks could understand how clownish you sound.
thunderfork 4 days ago
I do feel like this sinks a post of otherwise reasonable complaints. What "virtue signaling" is discourse even being accused of?
negura 4 days ago
bsenftner 4 days ago
I hate most of all the information black hole that is discord. I am member of several communities, where difficult issues are being solved using complex new software releases, but if you do not sit and watch the stream for the specific things you want, forget about finding anything useful you want.
Discord is bottomless sea of the same question being asked over and over and over, and the original question poster never seeing their replies. If there was not a notification when your own messages are replied, Discord would be 100% worthless.
K0IN 4 days ago
Does someone know which tools they are using for the multi day code ai code review?
chrismorgan 4 days ago
> Large parts of it are delivered straight into the user’s browser on every request: JavaScript, …
Ooh, now I want to try convincing people to return from JS-heavy single-page apps to multi-page apps using normal HTML forms and minimal JS only to enhance what already works without it—in the name of security.
(C’mon, let a bloke dream.)
ironmagma 4 days ago
There are a lot of things to hate in the Web3 world. Lack of back button form resubmission or redirect loops is a strange thing to dislike though.
kelsey98765431 4 days ago
The web has grown so hostile lately that javascript is honestly not safe or useful anymore. the only thing it's used for is serving ads and trackers and paywalls, if i can't read a website with no script enabled it's not meant for me and im just not reading it.
bruce511 4 days ago
I concur that most web sites could use less JavaScript. And a lot of (but not all) cosmetic uses for JavaScript can be done in CSS.
Of course for web apps (as distinct from web sites) most of what we do would be impossible without JavaScript. Infinite scrolling, maps (moving and zooming), field validation on entry, asynchronous page updates, web sockets, all require JavaScript.
Of course JavaScript is abused. But it's clearly safe and useful when used well.
sebbadk 4 days ago
thunderfork 2 days ago
LorenDB 4 days ago
drambledon 4 days ago
Their own software has become so bloated that now they're pivoting to bandwagon marketing. Soon some corporate enshittification platform will buy them.
robinhood 4 days ago
Thanks for this great comment that adds tremendous value to the discussion.
jonahs197 4 days ago
Never used it as it asks me to burn an email address to post.
dspillett 4 days ago
Thanks for letting us know. We were all wondering.