When hardware goes end-of-life, companies need to open-source the software

Scope of the Proposal (Open Source at EOL vs. Just Interfaces)

  • Several commenters note the article mostly calls for publishing hardware specs, protocols, and basic firmware/SDK, not full codebases.
  • Some argue that for simple devices (e.g., scales) this is enough; for complex ones (routers, SoCs) it isn’t.
  • Others say reverse-engineering can already recover many specs; the real value is removing legal/technical barriers to alternative firmware.

Secure Boot, Signing Keys, and “Fail Open” Designs

  • Strong debate over whether EOL should trigger release of signing keys.
  • One side: forcing key release would create botnet risk and let attackers hijack OTA update channels.
  • Counterpoint: embedded security is already “an unmitigated disaster,” and inability to fix EOL bugs due to locked boot chains is worse.
  • Proposed compromise:
    • Multiple-key architectures (ROM → 2nd-stage bootloader → app) where an EOL update can unlock the 2nd stage.
    • Physical or explicit user actions (buttons, magnets, sequences) to enter “unlock” mode.
    • Laws requiring designs to allow post-EOL user control.
  • Some call for outlawing permanently locked bootloaders; others stress security models that depend on locking but want reversible unlock.

Regulation vs. Market / Consumer Responsibility

  • Many want EU-style regulation: mandatory unlock at EOL, open APIs, or liability/refund if core functionality is killed.
  • Skeptics doubt enforcement against large tech firms and foresee loopholes (e.g., redefining “main function”).
  • Another camp says consumers should refuse cloud-tethered/closed devices and “vote with their wallets,” though others call this unrealistic at scale.

Cloud Dependence, E-Waste, and Examples

  • Multiple examples of good hardware rendered useless when backends died (frames, thermostats, speakers, cameras).
  • Some point to successful community rescues (e.g., alternative firmware and self-hosted backends) as proof of demand.
  • General agreement that dependence on vendor servers for basic local functions is a major e‑waste driver.

IP, Cost, and Practical Constraints

  • Commenters note:
    • Commercial products often share codebases across generations; open-sourcing one can reveal active IP.
    • Third-party licensed components can’t legally be open-sourced.
    • Cleaning a codebase for release can be expensive (months, six-figure costs).
  • Hence suggestions to:
    • Require only open APIs and freedom to run alternative software.
    • Design around open standards (e.g., local protocols, non-cloud basics) from the outset.

Broader Ideas: Copyright, Games, and Archival

  • Some advocate short software copyright terms and mandatory source escrow so old software and games enter the public domain in usable form.
  • Others highlight the practical difficulty of preserving old code and toolchains for decades, questioning the value of such laws without strong incentives.