{"id":731,"date":"2006-06-07T00:37:00","date_gmt":"2006-06-07T07:37:00","guid":{"rendered":"http:\/\/marcbook.local\/wds\/playground\/cybertrust\/2006\/06\/07\/linuss-law-aka-many-eyes-make-all-bugs-shallow\/"},"modified":"2023-05-16T09:48:57","modified_gmt":"2023-05-16T16:48:57","slug":"linuss-law-aka-many-eyes-make-all-bugs-shallow","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2006\/06\/07\/linuss-law-aka-many-eyes-make-all-bugs-shallow\/","title":{"rendered":"Linus\u2019s Law aka “Many Eyes Make All Bugs Shallow”"},"content":{"rendered":"

How many of you have heard \u201cmany eyes make all bugs shallow\u201d?\u00a0 <\/span>My guess is that many of you have and that it may have been in conjunction with an argument supporting why Linux and Open Source products have better security.\u00a0 <\/span>For example, Red Hat publishes a document at <\/span>www.redhat.com\/whitepapers\/services\/Open_Source_Security5.pdf<\/span><\/a>, which they commissioned from TruSecure (<\/span>www.trusecure.com<\/span><\/a>) which has a whole section called \u201cStrength in Numbers: The Security of \u201cMany Eyeballs\u201d and says:<\/span><\/p>\n

The security benefits of open source software stem directly from its openness. Known as the \u201cmany<\/span><\/i><\/p>\n

eyeballs\u201dtheory,it explains what we instinctively know to be true \u2013 that an operating system or application<\/span><\/i><\/p>\n

will be more secure when you can inspect the code,share it with experts and other members of your<\/span><\/i><\/p>\n

user community,identify potential problems and create fixes quickly.<\/span><\/i><\/p>\n

\n

\u00a0<\/span><\/p>\n

It reads pretty well, but there are a few small problems.\u00a0 <\/span>For one, nothing really ties the second sentence (the key one) back to the first one.\u00a0 <\/span>Secondly, the ability (can) to inspect code does not confirm that it actually gets inspected.\u00a0 <\/span>Let me emphasize by applying similar marketing speak <\/i>to a similar claim for closed source: <\/span><\/p>\n

\n

\u00a0<\/span><\/p>\n

The security benefits of closed source software stem directly from its quality processes. Known as quality assurance, it explains what we instinctively know to be true \u2013 that an operating system or application<\/span><\/i><\/p>\n

will be more secure when qualified persons do <\/span><\/b>inspect the code, [deleted unnecessary<\/span>] identify potential problems and create fixes quickly<\/i>.<\/span><\/p>\n

\n

\u00a0<\/span><\/p>\n

I would argue that both statements are equally true or false, depending on the reality behind the implied assumptions.\u00a0 <\/span>For example, if qualified people are inspecting all parts of the open source with the intent of finding and fixing security issues, it is probably true.\u00a0 <\/span>For the latter, if a closed source org does have a good quality process, they are likely finding and fixing more security issues than if they did not have that process.<\/span><\/p>\n

\n

\u00a0<\/span><\/p>\n

Going Back to the Source:\u00a0 <\/span>The Cathedral and the Bazaar<\/span><\/b> <\/span><\/p>\n

\n

\u00a0<\/span><\/p>\n

Now I\u2019ll ask a different question \u2013 how many of you have actually read <\/span>The Cathedral and the Bazaar<\/span><\/a> (CATB) by <\/span>Eric S. Raymond<\/span><\/a> (henceforth referred to as <\/span>ESR<\/span><\/a>)?\u00a0 <\/span>Shame on you, if you have not.\u00a0 <\/span>It is really interesting, and to me, it asks more interesting questions than it answers \u2026 though I\u2019ll try not to digress too much or too far.\u00a0 <\/span>Keeping to the core idea I want to discuss, let\u2019s look at the lesson #8 in the CATB, as quoted:<\/span><\/p>\n

Linus was directly aiming to maximize the number of person-hours thrown at debugging and development, even at the possible cost of instability in the code and user-base burnout if any serious bug proved intractable. Linus was behaving as though he believed something like this:<\/span><\/i><\/p>\n

\n

\u00a0<\/span><\/p>\n

8. Given a large enough beta-tester and co-developer base, almost every problem will be characterized quickly and the fix obvious to someone.<\/span><\/i><\/p>\n

\n

\u00a0<\/span><\/p>\n

Or, less formally, “Given enough eyeballs, all bugs are shallow.” I dub this: “Linus’s Law”.<\/span><\/i><\/p>\n

\n

\u00a0<\/span><\/p>\n

Even these statements have some implicit assumptions (ie, the code churn doesn\u2019t cause new problems quicker than the old ones are solved), but as I read through the lead in context and rule #8, I can\u2019t find anything to disagree with.\u00a0 <\/span>What I will note is that nothing in this limits his observation to Open Source.\u00a0 <\/span>As many later references use the less formal \u201cgiven enough eyeballs\u201d paraphrase, it does mentally prompt one to think about visual inspection, however, the original lesson doesn\u2019t refer to visual inspection at all!<\/i><\/b><\/span><\/span><\/p>\n

\n

\u00a0<\/span><\/p>\n

Though ESR was making observations and drawing lessons from Linus\u2019 Linux experience and his own fetchmail experience, I assert that his lessons can be applied more broadly to any software.\u00a0 <\/span>Going a bit further in the text, we find another important part of the discussion:<\/span><\/p>\n

My original formulation was that every problem “will be transparent to somebody”. Linus demurred that the person who understands and fixes the problem is not necessarily or even usually the person who first characterizes it. “Somebody finds the problem,” he says, “and somebody else understands it. And I’ll go on record as saying that finding it is the bigger challenge.”<\/span><\/i><\/p>\n

\n

\u00a0<\/span><\/p>\n

So, in finding and fixing issues, you need:<\/span><\/p>\n

\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><\/span><\/span>\u201cMany eyes\u201d identifying the issues, or a large enough beta-tester base (to take from lesson #8) so that almost every problem will be characterized, and<\/span><\/p>\n

\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><\/span><\/span>Enough developers working on fixing issues so that a fix can be developed and deployed<\/span><\/p>\n

\n

\u00a0<\/span><\/p>\n

ESR chronicles a lot of interesting stuff in CATB and enumerates them as lessons, but one key one he does not elaborate upon is the enabling ability to communicate cheaply and quickly with his users\/co-developers.\u00a0 <\/span>At the time, he used a mailing list.\u00a0 <\/span>UUCP news and public file servers were also available for communication and for sharing code and files.\u00a0 <\/span>What did this allow?\u00a0 <\/span>It allowed him to pretty easily find and connect with the roughly 300 people in the Western developed nations that shared his interest in an improved pop client \/ fetchmail.\u00a0 <\/span>Even 10 years prior and this would have been much more difficult.\u00a0 <\/span>But I digress too much \u2026 suffice it to say that cheap and easy communication and sharing made a distributed, volunteer, virtual team possible.<\/span><\/p>\n

\n

\u00a0<\/span><\/p>\n

Applying the \u201cMany Eyes\u201d Lessons To Commercial Software<\/span><\/span><\/b><\/p>\n

\n

\u00a0<\/span><\/p>\n

8. Given a large enough beta-tester and co-developer base, almost every problem will be characterized quickly and the fix obvious to someone.<\/span><\/i><\/p>\n

\n

\u00a0<\/span><\/p>\n

ESR contrasted between two testing models.\u00a0 <\/span>Rather than paraphrase, it seems simplest to quote what he says next in CATB:<\/span><\/p>\n

In Linus’s Law, I think, lies the core difference underlying the cathedral-builder and bazaar styles. In the cathedral-builder view of programming, bugs and development problems are tricky, insidious, deep phenomena. It takes months of scrutiny by a dedicated few to develop confidence that you’ve winkled them all out. Thus the long release intervals, and the inevitable disappointment when long-awaited releases are not perfect.<\/span><\/i><\/p>\n

\n

\u00a0<\/span><\/p>\n

In the bazaar view, on the other hand, you assume that bugs are generally shallow phenomena\u2014or, at least, that they turn shallow pretty quickly when exposed to a thousand eager co-developers pounding on every single new release. Accordingly you release often in order to get more corrections, and as a beneficial side effect you have less to lose if an occasional botch gets out the door.<\/span><\/i><\/p>\n

\n

\u00a0<\/span><\/p>\n

Now in my experience with commercial products, I can honestly say I never thought of development problems as either deep or shallow.\u00a0 <\/span>I thought of flaws as being across a spectrum, where some where simpler and easier to find and others might be deeper and have more challenging pre-conditions to replicate (e.g. timing, state).\u00a0 <\/span>I think that would apply to open or close source.\u00a0 <\/span><\/span><\/p>\n

\n

\u00a0<\/span><\/p>\n

So, ultimately, my analysis of what ESR describes is different in that I see the key difference as time and resources.\u00a0 <\/span>The Bazaar model (as he described) created a situation where more resources for both finding and fixing bugs were applied in parallel.\u00a0 <\/span>The Cathedral model (as he described) had (by implication) fewer resources that (therefore) needed to work over a longer period of time to achieve a similar level of quality.\u00a0 <\/span>This resource analysis makes sense to me, especially if you leave the models out of the equation for a moment.<\/span><\/p>\n

\n

\u00a0<\/span><\/p>\n

Let\u2019s step back.\u00a0 <\/span>What if you had an Open Source project working on a product where their were 5 core developers and about 20 co-developing users?\u00a0 <\/span>What if you had a comparable Closed Source project with 50 developers and 50 testers?\u00a0 <\/span>Assume both products have 500 active users over a one year period reporting problems and requesting enhancements.\u00a0 <\/span>Does it seem likely that the Open Source project will find and fix more bugs simply because it is Open Source?\u00a0 <\/span>No.\u00a0 <\/span>The number of \u201ceyes\u201d matter, but so do the number of actively contributing developers?\u00a0 <\/span>This is consistent with what ESR says (\u2026a large enough beta-tester and co-developer base\u2026)<\/i>, but is not consistent with the common usage of the \u201cmany eyes\u201d theory as quoted frequently in the press.<\/span><\/p>\n

\n

\u00a0<\/span><\/p>\n

How can commercial companies apply this?\u00a0 <\/span>First, set up a process that facilitates reasonably frequent releases to large numbers of active users that will find and report problems.\u00a0 <\/span>Next, ensure that you have enough developers to fix the reported issues that meet your quality bar.\u00a0 <\/span>The CATB also identifies a need for problem reports to have an efficiency of communication that makes the problems easy to replicate and enables the developers to quickly solve the problem.\u00a0 <\/span>Finally, there are several more rules which are about being customer-focused, which any product manager would endorse:<\/span><\/p>\n

7. Release early. Release often. And listen to your customers.<\/span><\/i><\/p>\n

10. If you treat your beta-testers as if they’re your most valuable resource, they will respond by becoming your most valuable resource.<\/span><\/i><\/p>\n

11. The next best thing to having good ideas is recognizing good ideas from your users. Sometimes the latter is better.<\/span><\/i><\/p>\n

\n

\u00a0<\/span><\/p>\n

The \u201cMany Eyes\u201d of Microsoft<\/span><\/span><\/b><\/p>\n

\n

\u00a0<\/span><\/p>\n

Finally, I would like to think about these issues in the context of how Microsoft currently releases products.<\/span><\/p>\n

\n

\u00a0<\/span><\/p>\n

First, let\u2019s take the core \u201cmany eyes\u201d and consider \u201cGiven a large enough beta-tester and co-developer base\u2026\u201d<\/i>\u00a0 <\/span>In CATB, Eric mentions that at a high, he had over 300 people on his active mailing list contributing to the feedback process.\u00a0 <\/span>There are multiple levels at which the Microsoft\u2019 product lifecycle seems to work towards achieving many eyes.\u00a0 <\/span><\/span><\/p>\n

\n

\u00a0<\/span><\/p>\n

Furthest from the development process are the millions and millions of users.\u00a0 <\/span>Take a product like Windows Server 2003, which is the next generation of Windows 2000 Server and you find it has benefitted from every bug report from every users in terms of (what Linus described as the harder problem) making bugs shallow.\u00a0 <\/span>In the more recent product generations, the communication process has been advanced in a technical way by <\/span>Windows Error Reporting<\/span><\/a> (WER aka Watson) and Online Crash Analysis (OCA).\u00a0 <\/span>Vince Orgovan and Will Dykstra gave a good presentation on the benefits of WER\/OCA at WinHec2004<\/span>. OCA also addresses another problem raised by CATB, that of communicating sufficient detail so a developer can properly diagnose a problem. \u00a0<\/span>One might argue that a large percentage of users do not choose to send crash details back to Microsoft for analysis and that brings us to the next item \u2013 Betas.<\/span><\/p>\n

\n

\u00a0<\/span><\/p>\n

Microsoft releases Beta versions of products that see very high numbers of day-to-day usage before final release.\u00a0 <\/span>When Windows XP SP2 was developed and released on a shortened one-year process, it had benefitted from <\/span>over 1 million Beta<\/span> users during the process \u2013 each one using and installing their own combination of shareware, local utilities, custom developed applications and legacy applications on thousands of combinations of hardware.\u00a0\u00a0 <\/span>I\u2019ve been running Windows Defender (aka Antispyware) along with many other users for about 1.5 years now, through several releases.<\/span><\/p>\n

\n

\u00a0<\/span><\/p>\n

Even before the external Beta stage, Microsoft employees are helping the product teams \u201crelease early and often\u201d by <\/span>dogfooding<\/span> products internally.\u00a0 <\/span>Incidentally, I am writing this entry using Office 12 Beta running on Windows Vista Beta2.<\/span><\/i>\u00a0 <\/span>Dogfood testers may not seem like a lot unless you consider that there are 55,000 employees and well over half of them will probably dogfood more major products.\u00a0 <\/span>High numbers of dogfood testers will certainly utilize OCA and will also run the internally deployed stress tools to try and help shake bugs out of the products.<\/span><\/p>\n

\n

\u00a0<\/span><\/p>\n

There are other mechanisms I won\u2019t go into in detail like customer councils, focus groups, customer feedback via support channels, feature requests, not to mention the Product Development and Quality Assurance teams themselves utilizing a variety of traditional and modern tools to find and fix issues.\u00a0 <\/span>The core process has even been augmented as described in <\/span>The Trustworthy Computing Security Development Lifecycle<\/span><\/a> to include threat modeling and source code annotation.<\/span><\/p>\n

\n

\u00a0<\/span><\/p>\n

I could go on, but I think you get the picture.\u00a0 <\/span>Hopefully, this will stir some folks to think beyond the superficial meaning of \u201cmany eyes make all bugs shallow\u201d the next time someone throws out as a blind attempt to assert superior security of Open Source.<\/span><\/p>\n

\n

\u00a0<\/span><\/p>\n

Jeff<\/span><\/p>\n

<\/div>\n","protected":false},"excerpt":{"rendered":"

How many of you have heard \u201cmany eyes make all bugs shallow\u201d?\u00a0 My guess is that many of you have and that it may have been in conjunction with an argument supporting why Linux and Open Source products have better security.\u00a0 For example, Red Hat publishes a document at www.redhat.com\/whitepapers\/services\/Open_Source_Security5.pdf, which they commissioned from TruSecure […]<\/p>\n","protected":false},"author":61,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3663],"topic":[3687],"products":[],"threat-intelligence":[3738],"tags":[3782],"coauthors":[3653],"class_list":["post-731","post","type-post","status-publish","format-standard","hentry","content-type-research","topic-threat-intelligence","threat-intelligence-threat-actors","tag-linux"],"yoast_head":"\nLinus\u2019s Law aka "Many Eyes Make All Bugs Shallow" | Microsoft Security Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2006\/06\/07\/linuss-law-aka-many-eyes-make-all-bugs-shallow\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Linus\u2019s Law aka "Many Eyes Make All Bugs Shallow" | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"How many of you have heard \u201cmany eyes make all bugs shallow\u201d?\u00a0 My guess is that many of you have and that it may have been in conjunction with an argument supporting why Linux and Open Source products have better security.\u00a0 For example, Red Hat publishes a document at www.redhat.com\/whitepapers\/services\/Open_Source_Security5.pdf, which they commissioned from TruSecure […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2006\/06\/07\/linuss-law-aka-many-eyes-make-all-bugs-shallow\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2006-06-07T07:37:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-16T16:48:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-microsoft_logo_element.png\" \/>\n\t<meta property=\"og:image:width\" content=\"512\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jeff Jones\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Jones\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2006\/06\/07\/linuss-law-aka-many-eyes-make-all-bugs-shallow\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2006\/06\/07\/linuss-law-aka-many-eyes-make-all-bugs-shallow\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/jeff-jones\/\",\"@type\":\"Person\",\"@name\":\"Jeff Jones\"}],\"headline\":\"Linus\u2019s Law aka “Many Eyes Make All Bugs Shallow”\",\"datePublished\":\"2006-06-07T07:37:00+00:00\",\"dateModified\":\"2023-05-16T16:48:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2006\/06\/07\/linuss-law-aka-many-eyes-make-all-bugs-shallow\/\"},\"wordCount\":2010,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"keywords\":[\"Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2006\/06\/07\/linuss-law-aka-many-eyes-make-all-bugs-shallow\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2006\/06\/07\/linuss-law-aka-many-eyes-make-all-bugs-shallow\/\",\"name\":\"Linus\u2019s Law aka \\\"Many Eyes Make All Bugs Shallow\\\" | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"datePublished\":\"2006-06-07T07:37:00+00:00\",\"dateModified\":\"2023-05-16T16:48:57+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2006\/06\/07\/linuss-law-aka-many-eyes-make-all-bugs-shallow\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2006\/06\/07\/linuss-law-aka-many-eyes-make-all-bugs-shallow\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2006\/06\/07\/linuss-law-aka-many-eyes-make-all-bugs-shallow\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Linus\u2019s Law aka “Many Eyes Make All Bugs Shallow”\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Linus\u2019s Law aka \"Many Eyes Make All Bugs Shallow\" | Microsoft Security Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2006\/06\/07\/linuss-law-aka-many-eyes-make-all-bugs-shallow\/","og_locale":"en_US","og_type":"article","og_title":"Linus\u2019s Law aka \"Many Eyes Make All Bugs Shallow\" | Microsoft Security Blog","og_description":"How many of you have heard \u201cmany eyes make all bugs shallow\u201d?\u00a0 My guess is that many of you have and that it may have been in conjunction with an argument supporting why Linux and Open Source products have better security.\u00a0 For example, Red Hat publishes a document at www.redhat.com\/whitepapers\/services\/Open_Source_Security5.pdf, which they commissioned from TruSecure […]","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2006\/06\/07\/linuss-law-aka-many-eyes-make-all-bugs-shallow\/","og_site_name":"Microsoft Security Blog","article_published_time":"2006-06-07T07:37:00+00:00","article_modified_time":"2023-05-16T16:48:57+00:00","og_image":[{"width":512,"height":512,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-microsoft_logo_element.png","type":"image\/png"}],"author":"Jeff Jones","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jeff Jones","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2006\/06\/07\/linuss-law-aka-many-eyes-make-all-bugs-shallow\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2006\/06\/07\/linuss-law-aka-many-eyes-make-all-bugs-shallow\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/jeff-jones\/","@type":"Person","@name":"Jeff Jones"}],"headline":"Linus\u2019s Law aka “Many Eyes Make All Bugs Shallow”","datePublished":"2006-06-07T07:37:00+00:00","dateModified":"2023-05-16T16:48:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2006\/06\/07\/linuss-law-aka-many-eyes-make-all-bugs-shallow\/"},"wordCount":2010,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"keywords":["Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2006\/06\/07\/linuss-law-aka-many-eyes-make-all-bugs-shallow\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2006\/06\/07\/linuss-law-aka-many-eyes-make-all-bugs-shallow\/","name":"Linus\u2019s Law aka \"Many Eyes Make All Bugs Shallow\" | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"datePublished":"2006-06-07T07:37:00+00:00","dateModified":"2023-05-16T16:48:57+00:00","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2006\/06\/07\/linuss-law-aka-many-eyes-make-all-bugs-shallow\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2006\/06\/07\/linuss-law-aka-many-eyes-make-all-bugs-shallow\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2006\/06\/07\/linuss-law-aka-many-eyes-make-all-bugs-shallow\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"Linus\u2019s Law aka “Many Eyes Make All Bugs Shallow”"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}}]}},"msxcm_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/731"}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/61"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=731"}],"version-history":[{"count":0,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/731\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=731"}],"wp:term":[{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=731"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=731"},{"taxonomy":"products","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/products?post=731"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=731"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/tags?post=731"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=731"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}