(no title)
skriticos2 | 1 year ago
The more interesting question would be, if the bug bounty is enough to keep legitimate researchers engaged to investigate and document the threats. But..
The bug bounty itself is only a drop in the bucket for security companies, as it's a, unsteady and b, not enough to cover even trivial research environment cost.
Pratcially it's a nice monetary and reputation bonus (for having the name associated with the detection) in addition to the regular bussiness of providing baseline security intelligence, solutions and services to enterprises, which is what earns the regular paycheck.
Living from quests and bonties is more the realm of fantasy.
ballenf|1 year ago
From a speech perspective, if I discovered an exploit and wrote a paper explaining it, what law prevents me from selling that research?
kevindamm|1 year ago
https://www.law.cornell.edu/uscode/text/18/1029 gives the definition and penalties for committing fraud and/or unauthorized access, and it includes the development of such tools.
A lot of it includes the phrasing "with intent to defraud" so it may depend on whether the court can show you knew your highest bidder was going to use it in this way.
(apologies for citing US-centric law, I figured it was most relevant to the current discussion but things may vary by jurisdiction, though probably not by much)
z3phyr|1 year ago