<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Economics on Open Source Security</title>
    <link>https://opensourcesecurity.io/tag/economics/</link>
    <description>Recent content in Economics on Open Source Security</description>
    <generator>Hugo -- 0.139.4</generator>
    <language>en</language>
    <lastBuildDate>Sun, 03 May 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://opensourcesecurity.io/tag/economics/feed.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>The lopsided economics of vulnerabilities</title>
      <link>https://opensourcesecurity.io/2026/05-vulnerability-economics/</link>
      <pubDate>Sun, 03 May 2026 00:00:00 +0000</pubDate>
      <guid>https://opensourcesecurity.io/2026/05-vulnerability-economics/</guid>
      <description>&lt;p&gt;There was recently a &lt;a href=&#34;https://infosec.exchange/@gregkh@social.kernel.org/116498329060550348&#34;&gt;really good thread&lt;/a&gt; about the &lt;a href=&#34;https://copy.fail/&#34;&gt;Copy Fail&lt;/a&gt; vulnerability between Will Dormann and Greg K-H. The TL;DR is that vulnerability reporting and disclosure is in a weird state of flux. This discussion got me wondering what&amp;rsquo;s going on, and I think we&amp;rsquo;re seeing the extremes emerging of how vulnerabilities have always worked. The middle of the bell curve has been removed.&lt;/p&gt;
&lt;p&gt;There are three groups in this story. The Security Researchers, the Companies, and Open Source developers. In the above discussion Will is a security research (one of the best I&amp;rsquo;ve ever seen). Greg is part of open source. There isn&amp;rsquo;t a great company representative, but that&amp;rsquo;s OK.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
