Company
Date Published
Author
David Baker
Word count
664
Language
English
Hacker News points
None

Summary

The bug bounty market is rapidly evolving, with many organizations embracing this concept despite some confusion surrounding paying hackers for vulnerabilities. A clear understanding of the distinction between bug bounty and extortion is essential, as a bug bounty is a reward offered for vulnerabilities discovered within a set scope, whereas extortion involves exploiting a vulnerability, selling information back to an organization, and then attempting to collect payment. The Uber breach, where a hacker exploited a vulnerability, was paid a ransom by Uber, which some argue is best practice, but others see as extortion. A bug bounty program should have clear guidelines, mutual respect between researchers and companies, and a trusted partner to help manage the relationship. Responsible disclosure programs shift the balance, removing uncertainty about what will happen when vulnerabilities are discovered, and having a trusted partner can create a competitive program that draws top researchers.