
The EU should fund open source initiatives that improve security and protect sensitive data. In addition, certification schemes should be established for the most critical open source tools. These are the expert opinions in the reports prepared for the EU order.
The first report was compiled for the European Parliament's Committee on Civil Liberties, Justice, and Internal Affairs. IT experts recommend helping to develop open-source end-to-end encryption software so that they are easy to use.
The use of free software is not a universal tool, they say, but it is "an important part in the EU strategy to strengthen independence in the field of information security and technology."
')
Another report (more precisely, this is the second part of the same report called “Mass Surveillance”) states how important it is to use operating systems and open source applications to reduce the risks of mass surveillance and personal data leakage.
Experts write that open source software is not free from errors and contains no fewer errors than proprietary software. But the problem of the latter is that it does not allow constant inspection of the code by the wide community of experts. And this is necessary.
In order to increase the security of citizens and to resist mass surveillance, the European Union is recommended to finance the development of "reliable open source implementations of various encryption specifications that can be verified and verified for correctness."
The OpenBSD operating system is mentioned in the
second part of the report in clause 7.2.8, where technical recommendations are given to reduce the risks of mass surveillance /
7.2.1.
Encryption of information on local media . For PC, DiskCryptor, TrueCrypt, FileVault, BitLocker and PGP are called programs.
7.2.2.
Encryption in the transfer of information : the extension of HTTPS Everywhere.
7.2.3.
Mail service protection : Prism-proof email (PPE) and Bitmessage protocols, Sendinc and StartMail web services, Enigmail and Mailvelope browser extensions, as well as GnuPG and GPG Tools.
7.2.4.
VoIP protection : Cellcrypt, Celltrust, OSTN, Omnisec, Seecrypt, SilentPhone, Redphone, Jitsi, Tox.
7.2.5.
Web Surf Protection : Tor, I2P, VPN Tunneling, Do Not Track, Blur, Disconnect, NoScript, Orweb, Onion Browser.
7.2.6.
Chat protection : TorChat, clients with support for OTR: Pidgin, Adium, MirOTR, Cryptocat, Jitsi, OTR-library in C #.
7.2.7.
Search query protection : DuckDuckGo, Ixquick, Startpage, Blekko, Ask.
7.2.8.
An operating system with sensitive data protection features: Qubes, OpenBSD, or TAILS.