{"id":53979,"date":"2023-10-05T07:38:00","date_gmt":"2023-10-05T07:38:00","guid":{"rendered":"http:\/\/4415cdaa-05fa-4cc6-97d2-f089d339c821"},"modified":"2023-10-05T07:38:00","modified_gmt":"2023-10-05T07:38:00","slug":"new-cryptographic-protocol-aims-to-bolster-open-source-software-security","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/new-cryptographic-protocol-aims-to-bolster-open-source-software-security\/","title":{"rendered":"New cryptographic protocol aims to bolster open-source software security"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage c-cmsImage_loaded\"><source media=\"(max-width: 767px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/bfbc5c0ef8a2133c5a0f1bb92db8dbbfe64ecfa1\/2023\/10\/04\/5fcc0bbf-b43e-4c1a-a58e-916cd9ddb63d\/gettyimages-913017298.jpg?auto=webp&amp;width=768\" alt=\"cybersecurity key\"><source media=\"(max-width: 1023px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/6e122d3e06f32f341512cd048f3be3405ff36610\/2023\/10\/04\/5fcc0bbf-b43e-4c1a-a58e-916cd9ddb63d\/gettyimages-913017298.jpg?auto=webp&amp;width=1024\" alt=\"cybersecurity key\"><source media=\"(max-width: 1440px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/54a8df488b3da3a9d0956a6a90a167da17372df9\/2023\/10\/04\/5fcc0bbf-b43e-4c1a-a58e-916cd9ddb63d\/gettyimages-913017298.jpg?auto=webp&amp;width=1280\" alt=\"cybersecurity key\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/54a8df488b3da3a9d0956a6a90a167da17372df9\/2023\/10\/04\/5fcc0bbf-b43e-4c1a-a58e-916cd9ddb63d\/gettyimages-913017298.jpg?auto=webp&amp;width=1280\" alt=\"cybersecurity key\" width=\"1280\" height=\"720.1039411000432\" fetchpriority=\"low\"><\/picture><\/div>\n<p> <!----><\/div>\n<p> <!----><figcaption> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">matejmo\/Getty Images<\/span><\/figcaption><\/figure>\n<p><a href=\"https:\/\/bastionzero.com\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"c-regularLink\">BastionZero<\/a>&#8216;s <a href=\"https:\/\/eprint.iacr.org\/2023\/296\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"c-regularLink\">OpenPubkey<\/a>, which is a new cryptographic protocol that&#8217;s designed to fortify the <a href=\"https:\/\/www.zdnet.com\/article\/why-open-source-is-the-cradle-of-artificial-intelligence\/\" rel=\"follow\">open-source software<\/a> ecosystem, is now a Linux Foundation open-source project. Docker is also integrating OpenPubkey, so that you can use it for container signing. This innovative <a href=\"https:\/\/www.zdnet.com\/article\/cryptography-safe-for-now-but-urgent-need-to-build-quantum-skills\/\" rel=\"follow\">cryptographic technology<\/a> promises enhanced security through zero-trust passwordless authentication.<\/p>\n<p>OpenPubkey provides this authentication by making a client-side modification to <a href=\"https:\/\/openid.net\/developers\/how-connect-works\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"c-regularLink\">OpenID Connect<\/a>. Connect is an authentication protocol based on the <a href=\"https:\/\/oauth.net\/2\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"c-regularLink\">OAuth 2.0<\/a> framework. Together, these technologies simplify how programmers can verify a user&#8217;s identity. The OpenID Token can then be committed to a user-held public key. This key transforms an ID Token into a certificate that cryptographically binds an OpenID Connect identity to a public key.&nbsp;<\/p>\n<p><strong>Also: <\/strong><a href=\"https:\/\/www.zdnet.com\/article\/best-vpn\/\" rel=\"follow\"><strong>The best VPN services (and how to choose the right one for you)<\/strong><\/a><\/p>\n<p>This &#8220;PK Token&#8221; can then be used to sign messages, and these signatures can be authenticated and attributed to the user&#8217;s OpenID Connect identity. Essentially, OpenPubkey transforms an <a href=\"https:\/\/openid.net\/developers\/how-connect-works\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"c-regularLink\">OpenID Connect Identity Provider (IdP)<\/a> into a <a href=\"https:\/\/www.ssl.com\/faqs\/what-is-a-certificate-authority\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"c-regularLink\">Certificate Authority (CA)<\/a>.&nbsp;<\/p>\n<p><!----><\/p>\n<p>This process makes any application using OpenID Connect for authentication much more secure without any other changes. OpenPubkey is transparent to users and OpenID providers. An OpenID provider can not even determine that OpenPubkey is being used. This makes OpenPubkey fully compatible with existing OpenID providers. This compatability includes Google, Azure\/Microsoft, Okta, OneLogin, and Keycloak. This project is not adding any new OpenID Connect trusted parties.<\/p>\n<p>OpenPubkey is already being used to authenticate signed messages and identities for users with accounts on Google, Microsoft, Okta, and OneLogin. By augmenting OpenID Connect, OpenSubkey will enable users and workloads to sign artifacts under their OpenID identity. This capability is instrumental for applications requiring secure remote access and software supply chain security features, including signed builds, deployments, and code commits.<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/6-simple-cybersecurity-rules-to-live-by\/\" rel=\"follow\">6 simple cybersecurity rules to live by<\/a><\/strong><\/p>\n<p>That level of application all sounds good in practise, but you should keep in mind that even OpenPubkey&#8217;s reference implementation is a work in progress. For example, the OpenPubkey client still needs support for the Github OpenID Provider, the Azure OpenID Provider (OP).<\/p>\n<p>Jim Zemlin, the Linux Foundation&#8217;s executive director, is enthusiastic about hosting the OpenPubkey Project: &#8220;This initiative is poised to be a cornerstone in enhancing the security fabric of the open-source software community.&#8221; Zemlin extended an invitation to developers and organizations to join hands in this collaborative venture aimed at amplifying software supply chain security.<\/p>\n<p><a href=\"https:\/\/www.testifysec.com\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"c-regularLink\">TestifySec<\/a>, a prominent cybersecurity player. has endorsed the initiative. Cole Kennedy, CEO of TestifySec, commended the OpenPubkey approach of enabling easy and reliable signing: &#8220;The collaboration between Docker and BastionZero has our unwavering support. We are optimistic about the immense benefits the broader community stands to gain.&#8221;&nbsp;<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/home-and-office\/networking\/linux-tries-to-dump-windows-notoriously-insecure-rndis-protocol\/\" rel=\"follow\">Linux tries to dump Windows&#8217; notoriously insecure RNDIS protocol<\/a><\/strong><\/p>\n<p>Interested in learning more about getting OpenPubkey ready for production? Check out the <a href=\"https:\/\/github.com\/openpubkey\/openpubkey\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"c-regularLink\">OpenPubkey GitHub page<\/a> and get to work. This is an authentication and security project that shows a lot of promise.&nbsp;<\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/new-cryptographic-protocol-aims-to-bolster-open-source-software-security\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Linux Foundation, BastionZero, and Docker believe OpenPubkey bolsters zero-trust passwordless authentication.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-53979","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>New cryptographic protocol aims to bolster open-source software security 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/new-cryptographic-protocol-aims-to-bolster-open-source-software-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New cryptographic protocol aims to bolster open-source software security 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/new-cryptographic-protocol-aims-to-bolster-open-source-software-security\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-05T07:38:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/54a8df488b3da3a9d0956a6a90a167da17372df9\/2023\/10\/04\/5fcc0bbf-b43e-4c1a-a58e-916cd9ddb63d\/gettyimages-913017298.jpg?auto=webp&amp;width=1280\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-cryptographic-protocol-aims-to-bolster-open-source-software-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-cryptographic-protocol-aims-to-bolster-open-source-software-security\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"New cryptographic protocol aims to bolster open-source software security\",\"datePublished\":\"2023-10-05T07:38:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-cryptographic-protocol-aims-to-bolster-open-source-software-security\\\/\"},\"wordCount\":512,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-cryptographic-protocol-aims-to-bolster-open-source-software-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/54a8df488b3da3a9d0956a6a90a167da17372df9\\\/2023\\\/10\\\/04\\\/5fcc0bbf-b43e-4c1a-a58e-916cd9ddb63d\\\/gettyimages-913017298.jpg?auto=webp&amp;width=1280\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-cryptographic-protocol-aims-to-bolster-open-source-software-security\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-cryptographic-protocol-aims-to-bolster-open-source-software-security\\\/\",\"name\":\"New cryptographic protocol aims to bolster open-source software security 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-cryptographic-protocol-aims-to-bolster-open-source-software-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-cryptographic-protocol-aims-to-bolster-open-source-software-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/54a8df488b3da3a9d0956a6a90a167da17372df9\\\/2023\\\/10\\\/04\\\/5fcc0bbf-b43e-4c1a-a58e-916cd9ddb63d\\\/gettyimages-913017298.jpg?auto=webp&amp;width=1280\",\"datePublished\":\"2023-10-05T07:38:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-cryptographic-protocol-aims-to-bolster-open-source-software-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-cryptographic-protocol-aims-to-bolster-open-source-software-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-cryptographic-protocol-aims-to-bolster-open-source-software-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/54a8df488b3da3a9d0956a6a90a167da17372df9\\\/2023\\\/10\\\/04\\\/5fcc0bbf-b43e-4c1a-a58e-916cd9ddb63d\\\/gettyimages-913017298.jpg?auto=webp&amp;width=1280\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/54a8df488b3da3a9d0956a6a90a167da17372df9\\\/2023\\\/10\\\/04\\\/5fcc0bbf-b43e-4c1a-a58e-916cd9ddb63d\\\/gettyimages-913017298.jpg?auto=webp&amp;width=1280\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-cryptographic-protocol-aims-to-bolster-open-source-software-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New cryptographic protocol aims to bolster open-source software security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New cryptographic protocol aims to bolster open-source software security 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/new-cryptographic-protocol-aims-to-bolster-open-source-software-security\/","og_locale":"en_US","og_type":"article","og_title":"New cryptographic protocol aims to bolster open-source software security 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/new-cryptographic-protocol-aims-to-bolster-open-source-software-security\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-10-05T07:38:00+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/54a8df488b3da3a9d0956a6a90a167da17372df9\/2023\/10\/04\/5fcc0bbf-b43e-4c1a-a58e-916cd9ddb63d\/gettyimages-913017298.jpg?auto=webp&amp;width=1280","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/new-cryptographic-protocol-aims-to-bolster-open-source-software-security\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/new-cryptographic-protocol-aims-to-bolster-open-source-software-security\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"New cryptographic protocol aims to bolster open-source software security","datePublished":"2023-10-05T07:38:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/new-cryptographic-protocol-aims-to-bolster-open-source-software-security\/"},"wordCount":512,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/new-cryptographic-protocol-aims-to-bolster-open-source-software-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/54a8df488b3da3a9d0956a6a90a167da17372df9\/2023\/10\/04\/5fcc0bbf-b43e-4c1a-a58e-916cd9ddb63d\/gettyimages-913017298.jpg?auto=webp&amp;width=1280","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/new-cryptographic-protocol-aims-to-bolster-open-source-software-security\/","url":"https:\/\/www.threatshub.org\/blog\/new-cryptographic-protocol-aims-to-bolster-open-source-software-security\/","name":"New cryptographic protocol aims to bolster open-source software security 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/new-cryptographic-protocol-aims-to-bolster-open-source-software-security\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/new-cryptographic-protocol-aims-to-bolster-open-source-software-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/54a8df488b3da3a9d0956a6a90a167da17372df9\/2023\/10\/04\/5fcc0bbf-b43e-4c1a-a58e-916cd9ddb63d\/gettyimages-913017298.jpg?auto=webp&amp;width=1280","datePublished":"2023-10-05T07:38:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/new-cryptographic-protocol-aims-to-bolster-open-source-software-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/new-cryptographic-protocol-aims-to-bolster-open-source-software-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/new-cryptographic-protocol-aims-to-bolster-open-source-software-security\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/54a8df488b3da3a9d0956a6a90a167da17372df9\/2023\/10\/04\/5fcc0bbf-b43e-4c1a-a58e-916cd9ddb63d\/gettyimages-913017298.jpg?auto=webp&amp;width=1280","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/54a8df488b3da3a9d0956a6a90a167da17372df9\/2023\/10\/04\/5fcc0bbf-b43e-4c1a-a58e-916cd9ddb63d\/gettyimages-913017298.jpg?auto=webp&amp;width=1280"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/new-cryptographic-protocol-aims-to-bolster-open-source-software-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"New cryptographic protocol aims to bolster open-source software security"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53979","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=53979"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53979\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=53979"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=53979"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=53979"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}