Skip to main content

OpenBSD Project survived after $20,000 Donation from Romanian Bitcoin Billionaire

Last year in the month of December the Security-focused Unix-like distribution 'OpenBSD' Foundation announced that it was facing shut down due to lack of funds to pay their electricity bills and dedicated Internet line costs.

     Theo de Raadt, the founder of the OpenBSD project, and Bob Beck (Developer) announced:

"In light of shrinking funding, we do need to look for a source to cover project expenses. If need be the OpenBSD Foundation can be involved in receiving donations to cover project electrical costs. But the fact is right now, OpenBSD will shut down if we do not have the funding to keep the lights on."
Just after a month, a Bitcoin billionaire from Romania has stepped in and sorted OpenBSD out!Mircea Popescu, the creator of the MPEx Bitcoin stock exchange has offered $20,000 donations to the OpenBSD Foundation and saved the existence of OpenBSD development from being stopped.

Like each open source project, OpenBSD production servers were funded by donations from individuals or organization. This operating system had reached to an edge where its sustainability was in question.

Funding issues are not new to the OpenBSD project. In 2006, it faced a similar issue, i.e. was running at a $20,000 loss each year.

The OpenBSD developed at the University of California, Berkeley, is the most important name in UNIX derivatives, which is a core component for developing firewalls, Microsoft’s services for UNIX, Windows Core Security Force and other propriety systems.

OpenBSD itself has built in cryptography and packet filtering suit, which is used in firewall, IDS, VPN gateways.

The OpenBSD Foundation has now raised $100,000 and still trying to raise money against its 2014 target i.e. $150,000 to continue to sponsor hackathons and other development efforts.

Comments

Popular posts from this blog

HC WeB : A Browser for HACKERS...

A Browser for HACKERS... Try for Free... Download HC WeB Setup Gallery: Online Penetration Testing Tools Index Information Gathering Whois DNS Location Info Enumeration and Fingerprint Data Mining Search Engines Editors Online Text Editors Share Text Snippets Network Utilities Ping HTTP HTTPS VNC Remote Desktop SSH DNS Sniffers Misc Forensics Frameworks URL Cloaking E-mail Password Cracking Encoders and Decoders Encoders Decoders Malwares Malware Analysis Identify Malicious Websites Suspected Malicious IPs and URLs Application Auditing SQL Injection Cross Site Scripting File Inclusion Anonymity Proxy Others Hackery Open Penetration Testing Bookmarks Collection Hacker Media Blogs, Forums, Magazines and Videos. Methodologies Penetration testing frameworks, standards and methodologies. OSINT Presentations, People, Organizations and Infrastructure.  Exploits an...

Facebook Web Security Bug Bounty: Directory Traversal Vulnerability / RCE In Parse.com

http://parse.com   directory traversal vulnerability Little Insight: http://parse.com  was vulnerable to a directory traversal / RCE vulnerability. As a result, it was possible for an attacker to load web server-readable files from the local filesystem. or Run commend on That Well this is my 4th reward form facebook  Directory Traversal or RCE Vulnerability  That  give me 5th position in Facebook white-hat Page Report Date :23  July 2014 Reward For Directory Traversal or RCE Vulnerability :  20000$ How This work......? As we discussed earlier on my old post  Flowdock Directory Traversal Vulnerability exposed files outside of Rails’ view paths. '%5C' turns into '\' after decoding. Using Rack::Protection    it only rejects '/../' segments in the request path.   patch apply for Rack::Protection acording CVE-2014-0130  and  also Reject now '%5C' turns into '\' af...

Click-jacking or UI Redressing

Hi! Just want to share my finding, I have found Click-jacking or UI Redressing Vulnerability in   on Google Map , enjoy ;-) This bug was reported to Google Security Team, fixed immediately. About Title:  ClickJacking or UI Redressing on Google Map Business Risk: Normal Discovery Date: October 8, 2013 Author: Jitendra Jaiswal (me) Poc Details   Impact On victim :  1. attacker change victim profile pic by useing his webcam and upload 2. update status acording to attacker Best, Jeet Jaiswal