I severely MISREAD this article as if they were talking about getting rid of OFFENSIVE to one's sensibilities software. I.e. get rid of all software that has swearing, sex, violence, etc. in it .... which I thought GOOD LUCK WITH THAT! It took me a second or ten to realize they were talking about software that exploits machine and user vulnerabilities.
That goal of removing offensive-capability software is kinda difficult to do when I could replace parts of the BIOS on a GPU (i.e. graphics card) to take screen shots every 5 seconds and compress/encrypt it out to some unnamed website folder OR I could modify ANY software executable in a certain way that its hash value (i.e. digital signature) STILL calculates out to the original correct value BUT NOW HAS the modified bytes in it that do my dastardly deeds!
...OR....
I could secretly strobe your display in such a way to embed sub-conscious and subliminal messages that tell you to buy my products or goto my websites which will steal your passwords or make you spend large amounts of money on useless items or services! I could even have those sub-conscious commands MAKE YOU drink rotten milk to poison you so I could profit out of the secret Two Million Euro insurance policy I took out on you with ME as the beneficiary! Do that enough times and I could retire and BUY the Playboy Mansion WITH the models as part of the deal!
....AND.....
I could make microcode software that injects itself and hides in the 32 kilobyte caches of automobile microcontrollers which are ALWAYS kept alive by the thin trickle of car battery power. That cache based software then turns on the brakes OR the accelerator within your post-2010 era drive-by-wire vehicles as my cache-based software intercepts data from various car sensors sensors and on-the-fly changes their values when they redirect to the destination microcontroller! I could make you drive into a river or or off the cliff and collect on some insurance money!
SOFTWARE CAN DO ANYTHING !!!!!!!
BEWARE THE SOFTWARE YOU CANNOT SEE and DO NOT KNOW ABOUT !!!
This is all about "THE UNKNOWN UNKNOWNS" --- Evil people creating malicious code that can wreck havoc against YOU and your loved ones is but a mere few days or weeks worth of coding and injecting into your VULNERABLE devices and systems. Even a TOASTER can be compromised these days! Then again WHO CAN YOU TRUST?
Apple?
Microsoft?
Oracle?
Me?
You don't NEED to regulate software -- BUT YOU DO NEED TO EVALUATE IT! And that means FULLY OPEN SOURCE CODE that industry experts from a WIDE variety of backgrounds that BOTH are paid AND do volunteer their time to review and bring to the public light their intended and ACTUAL function.
Even COMPILERS and INTERPRETERS can be compromised SO AGAIN ---- Keep ALL software in ANY critical system OPEN FOR PUBLIC and INDUSTRY REVIEW !!!
V