Conversation

We’ve been criticized for not having a 3rd party run our bug bounty program but this is exactly why we run it ourselves. Resubmitting bugs for the bounty is the least bad thing that can happen. Worst case, the stolen bugs are sold to more serious hackers or directly exploited.
Quote Tweet
A HackerOne employee accessed vulnerability data of customers, then re-submitted the security issues to the same customers for personal gain. Interesting report by @Hacker0x01 on the incident and investigation. hackerone.com/reports/1622449
Show this thread
in theory you delegate: . two side reputation check . dealing with bureaucracy . filtering duplicates . avoiding back and forth when getting details . report standardization etc in practice you still have to do all those things, and now you have to pay a fee to the platform 🫡
1
wat? the whole point of proof of reserve schemes is every user can verify for themselves that they are correctly included in the merkle tree committed to publicly.
1
1
Show replies