{"id":52063,"date":"2022-08-21T16:19:45","date_gmt":"2022-08-21T16:19:45","guid":{"rendered":"https:\/\/harchi90.com\/free-secure-and-open-source-how-filezilla-is-making-an-old-school-protocol-cool-again\/"},"modified":"2022-08-21T16:19:45","modified_gmt":"2022-08-21T16:19:45","slug":"free-secure-and-open-source-how-filezilla-is-making-an-old-school-protocol-cool-again","status":"publish","type":"post","link":"https:\/\/harchi90.com\/free-secure-and-open-source-how-filezilla-is-making-an-old-school-protocol-cool-again\/","title":{"rendered":"Free, Secure, and Open-Source: How FileZilla is Making an Old School Protocol Cool Again"},"content":{"rendered":"
\n

\t\t\t\tIt’s a free and open-source, cross-platform FTP application that allows secure<\/em> file transfering \u2014 and it’s making an old-school protocol cool again, according to a recent blog post.<\/p>\n

Started about 21 years ago \u2014 and downloaded by millions each year \u2014 FileZilla remains “committed to their role in liberating technology, by making it accessible, open and also secure,” according to the blog post. But it also explains how FileZilla has beefed up that security through a collaboration with the internet freedom nonprofit, the Open Technology Fund (or “OTF”):<\/p>\n

Over the past year, FileZilla has utilised support from OTF to undertake two activities that enhanced and ensured the security of their tools. The first was integrating FileZilla Server with Let’s Encrypt, a free, automated, and open source certificate authority that ensures secure communication between the two end-points sending or receiving a file via FileZilla…. Secondly, FileZilla ran a penetration test, a service offered by OTF’s Red Team Lab. A team of independent researchers attempted to force access to the FileZilla server to see if they could gain control. These researchers were highly skilled, and the testing was extensive. The team conducting the test only found very minor security vulnerabilities that FileZilla were able to fix immediately. As a result of this process, anyone wanting to use the FileZilla software can trust that it has been cross-scrutinised by a third party and found to be secure….<\/i><\/p>\n

FileZilla respects users’ confidentiality: they do not track your behaviour, nor sell your data to other companies. While they do have advertisements on their website, they are posted exactly as advertisements would be posted in a newspaper. Nobody knows that you are reading the advertisements, or that you decided to call or connect to the advertised website. The advertisement has simply been attached to the webpage, without any underlying tracking…. . “Our mission hasn’t changed in over 20 years: design, develop, maintain and enhance free tools to securely transfer files with ease and reliability,” said Tim Kosse, FileZilla Lead Developer. This decision was a political one taken by FileZilla, to always preserve the freedom of their tools, and of their users. “We aren’t the typical commercial open-source venture that starts doing things for free, and over time, closes this and that to make money” said Roberto Galoppini, FileZilla Director of Strategy. “While you might not see FileZilla listed at the NYSE [New York Stock Exchange] any time soon, the freedom of our tools will never be questioned….”<\/p>\n

[I]f you work in an industry that requires the secure transfer of sensitive files, or if you simply have personal photographs or videos you want to keep confidential, using proprietary platforms to share or store them can put your information at risk of being exposed… FileZilla offers an alternative that is secure and private. Their tools are developed by a team that is deeply invested in protecting users’ confidentiality, and liberating technology is central to their work and decision-making….<\/p>\n

At the same time, projects like FileZilla remind us that there exists a global community of technologists, activists, coders, bloggers, journalists, software developers, and mindful internet users making internet freedom a lived reality and daily practice. Supporting, experimenting with and using free and open source tools, such as the FileZilla client and server, enables us to disinvest from the capitalist pursuit of corporate control of technology and unchecked surveillance of our data.<\/p>\n

Rather, we can step into alignment with an alternative, parallel narrative being created by a community of resistance that is grounded in principles of cooperation, solidarity, commons and openness.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"

It’s a free and open-source, cross-platform FTP application that allows secure file transfering \u2014 and it’s making an old-school protocol cool again, according to a recent blog post. Started about 21 years ago \u2014 and downloaded by millions each year \u2014 FileZilla remains “committed to their role in liberating technology, by making it accessible, open …<\/p>\n

Free, Secure, and Open-Source: How FileZilla is Making an Old School Protocol Cool Again<\/span> Read More »<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-global-header-display":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true},"categories":[4],"tags":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":35024,"url":"https:\/\/harchi90.com\/the-microsoft-team-racing-to-catch-bugs-before-they-happen\/","url_meta":{"origin":52063,"position":0},"title":"The Microsoft Team Racing to Catch Bugs Before They Happen","date":"August 4, 2022","format":false,"excerpt":"As a rush of cybercriminals, state-backed hackers, and scammers continue to flood the zone with digital attacks and aggressive campaigns worldwide, it's no surprise that the maker of the ubiquitous Windows operating system is focused on security defense. Microsoft's Patch Tuesday update releases frequently contain fixes for critical vulnerabilities, including\u2026","rel":"","context":"In "Technology"","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":43372,"url":"https:\/\/harchi90.com\/why-its-taking-so-long-to-encrypt-facebook-messenger\/","url_meta":{"origin":52063,"position":1},"title":"Why it’s taking so long to encrypt Facebook Messenger","date":"August 12, 2022","format":false,"excerpt":"After a high-profile incident in which subpoenaed Facebook messages led to felony charges for a 17-year-old girl and her mother in a Nebraska abortion case, Meta said Thursday that it would expand testing of end-to-end encryption in Messenger ahead of a planned global rollout. This week, the company will automatically\u2026","rel":"","context":"In "Technology"","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":23591,"url":"https:\/\/harchi90.com\/microsoft-closes-off-two-avenues-of-attack-on-its-software-the-register\/","url_meta":{"origin":52063,"position":2},"title":"Microsoft closes off two avenues of attack on its software \u2022 The Register","date":"July 23, 2022","format":false,"excerpt":"Microsoft is trying to shut the door on a couple of routes cybercriminals have used to attack users and networks. The enterprise IT giant's policy of blocking Visual Basic for Applications (VBA) macros in downloaded Office documents by default has been activated once again after a brief pause to address\u2026","rel":"","context":"In "Technology"","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":41216,"url":"https:\/\/harchi90.com\/microsoft-patch-tuesday-august-2022-edition-krebs-on-security\/","url_meta":{"origin":52063,"position":3},"title":"Microsoft Patch Tuesday, August 2022 Edition \u2013 Krebs on Security","date":"August 10, 2022","format":false,"excerpt":"Microsoft today released updates to fix a record 141 security vulnerabilities in its windows operating systems and related software. Once again, Microsoft is patching a zero-day vulnerability in the Microsoft Support Diagnostics Tool (MSDT), a service built into Windows. Redmond also addressed multiple flaws in Exchange Server \u2014 including one\u2026","rel":"","context":"In "Technology"","img":{"alt_text":"","src":"https:\/\/i0.wp.com\/krebsonsecurity.com\/wp-content\/uploads\/2022\/07\/winupdatedate.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":61148,"url":"https:\/\/harchi90.com\/lebron-james-family-didnt-know-he-wanted-to-play-in-nba-with-bronny\/","url_meta":{"origin":52063,"position":4},"title":"LeBron James’ Family Didn’t Know He Wanted to Play in NBA With Bronny","date":"August 30, 2022","format":false,"excerpt":"LeBron James has several times stated his goal to play in the NBA with his oldest son, Bronny. In an interview with Sports Illustrated, James' family members said they were unaware of that goal until James said it publicly. Bronny is a highly regarded high school senior, but his path\u2026","rel":"","context":"In "Sports"","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":45202,"url":"https:\/\/harchi90.com\/the-top-2fa-apps-updated-august-22\/","url_meta":{"origin":52063,"position":5},"title":"The top 2FA apps (updated August 22)","date":"August 14, 2022","format":false,"excerpt":"Your online accounts are much safer when you rely on more than only a password, and that's where two-factor authentication (2FA) apps come in. You can use them to create an extra layer of security for your accounts, requiring you to enter a one-time password (OTP) in addition to your\u2026","rel":"","context":"In "Technology"","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"fifu_image_url":"https:\/\/a.fsdn.com\/sd\/topics\/encryption_64.png","_links":{"self":[{"href":"https:\/\/harchi90.com\/wp-json\/wp\/v2\/posts\/52063"}],"collection":[{"href":"https:\/\/harchi90.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/harchi90.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/harchi90.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/harchi90.com\/wp-json\/wp\/v2\/comments?post=52063"}],"version-history":[{"count":0,"href":"https:\/\/harchi90.com\/wp-json\/wp\/v2\/posts\/52063\/revisions"}],"wp:attachment":[{"href":"https:\/\/harchi90.com\/wp-json\/wp\/v2\/media?parent=52063"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/harchi90.com\/wp-json\/wp\/v2\/categories?post=52063"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/harchi90.com\/wp-json\/wp\/v2\/tags?post=52063"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}