(no title)
bookshelf11 | 5 years ago
If this hack had been exploited Tesla market capitalization would've taken a multi-million if not billion dollar hit. And here they are, paying out relative chump change to a guy that alerted them to it.
bookshelf11 | 5 years ago
If this hack had been exploited Tesla market capitalization would've taken a multi-million if not billion dollar hit. And here they are, paying out relative chump change to a guy that alerted them to it.
sellyme|5 years ago
But that's the point. Who's out there that would exploit this because they thought $50,000 wasn't worth it, but would change their minds for $1,000,000?
Realistically there's only two types of people who would maliciously exploit something of this magnitude: the mentally unstable (people who just like to cause chaos), and state-sponsored actors attempting to disrupt other nations. Neither of those groups seem particularly likely to change their mind for an extra zero or two.
The "pay more than the black market will" model works for smaller bugs, but for ones like this that would immediately get every three letter agency on the planet trying to find you, the $50,000 isn't a valuation of the worth of that bug report, it's a gratuity. And for the average bug reporter, that's an extremely nice one.
Can they pay more? Yes, absolutely. Should they? Probably, yeah. Do they have any reason to? No.
The solution to this is to have legal requirements for security, and extremely heavy fines for having released dangerous software (some portion of this fine financing a similar bug bounty program). Take the option of how much money to hand out away from the companies, and they'll be incentivised to take security much more seriously in the first place.
Of course, this requires lawmakers to have a basic understanding of technology, so we're at least 20 years and 3 major catastrophes away from getting anywhere near that actually occurring.
pydry|5 years ago
Yeah, they do. It's a self declared measure of how seriously they take their security. They valued avoiding the takeover of their fleet at 0.0000125% of their market cap.
The reason I left lastpass was because the bug bounty for a bug that could expose all of everybody's passwords just by visiting a website was, like, about $1k. The company became dead to me in a split second and I wanted out immediately.
....and it's not doing too well these days, from what I can tell.
donmcronald|5 years ago
The article says the max bug bounty was increased to $15k eventually, so it was even less than that at the time even though they gave him $50k. Kudos to whoever at Tesla stepped up and gave him extra.
I'd seriously consider not reporting something like that for $15k unless I was worried about someone else exploiting it and having a trail of access logs lead back to me. People that discover bugs like that with massive destructive potential must be on every TLA list on the planet afterwards and I don't think that's worth $15k.
$1 million is life changing and puts you into a higher social class. IE: Poor == probably a criminal. Rich == probably not a criminal. It's sad, but that's the way it works and I'd rather be rich if I were on a short list of "dangerous" hackers.
ssss11|5 years ago
paulannesley|5 years ago
Makes me think of the recent Twitter account take-overs. The amateur attackers acquired access which could have caused enormous damage, and used it to scam ~$100,000. The difference between $50k and $1m in bounty could have turned them towards responsible disclosure.
(That said: they probably hoped to scam much more. And they got caught. And the way they obtained access was probably way out of the scope of a bug bounty program / the law.)
justinclift|5 years ago
That kind of incentive has led to underhanded behaviour in the past, so it wouldn't be surprising to see it happen again.
aristophenes|5 years ago
r77ruuddj|5 years ago
mNovak|5 years ago
I don't know if this is strictly legal either, but definitely more plausible deniability.
badrabbit|5 years ago
oconnor663|5 years ago
brippalcharrid|5 years ago
tptacek|5 years ago
For the moment, rather than re-having this discussion, we can just note that bounty prices are what they are, and that no tech firm pays "existential" rates for new vulnerabilities (except, perhaps, Uber, where literally everyone involved in that story is now in the federal criminal court system).
oska|5 years ago
dheera|5 years ago
Aeolun|5 years ago
But the fact that $50000 is chump change for Tesla does not mean it's chump change to the recipient.
falcolas|5 years ago
StillBored|5 years ago
These days companies that take their security seriously are hopefully harder to exploit. If it takes someone a couple months of slow fuzzing/etc to find an exploit that is probably below market for the persons skills here in the US.
Maybe a part of these bug bounties should be not only how critical the bug is, but some metric of how much work the individual put in before finding the problem.
unknown|5 years ago
[deleted]
filleduchaos|5 years ago
bookmarkable|5 years ago
It would also align hackers interest with the businesses they are helping secure.
everfree|5 years ago
dheera|5 years ago
rtlfe|5 years ago
Most people would far prefer cash
unknown|5 years ago
[deleted]
mmaunder|5 years ago
simple_bot|5 years ago
abnry|5 years ago
perl4ever|5 years ago
gorgoiler|5 years ago
Bounty payers enjoy a hefty discount when they waive their right to prosecute.
salty_biscuits|5 years ago
bookshelf11|5 years ago
That said, I think they have some hiking/trekking oriented products which could cause problems if you were relying on them.
The headline "electric car fleet hacked" is a lot scarier than "smart watches hacked".
Then again, maybe people really don't give a shit about this stuff, and these bounties are priced correctly.
amanzi|5 years ago
cactus2093|5 years ago
I think the high likelihood of being caught and going to prison is also already a pretty big deterrent for people. Just think of all the challenges of actually pulling a hack like this off without being caught. For one thing, just the poking around that led to the discovery of the vulnerability has probably already logged a bunch of potentially suspicious activity linked to this guy's VIN number. So even if he sold it to someone else who did the hack he could probably be caught already. If he tried to orchestrate the hack himself, not only does he need to not be caught directly, but he'd also have to make a very large, very suspicious short trade right before the hack without it being traced back to him. Plus there's always a possibility that Tesla would have been able to lock him out quickly anyway or had some other kind of rate-limiting or other measures in place to prevent significant damage, or that even if he pulled off the hack perfectly the stock price wouldn't drop as much as expected.
taneq|5 years ago
I think it's more likely that the person who reported the vulnerability would have done the right thing regardless of any bounty.
kypro|5 years ago
I also wonder when something becomes a "hack". Some systems are so insecure you can almost accidentally exploit them. In this case the API just required an ID for access. How would someone know if that was by design, or a mistake?