As Microsoft have no intensions of ever paying me for all my submitted vulnerabilities I am forced to do this. Countdown starts today- then I will post them all public. Ms is just trying to get time to patch them then never pay me. I have for over 100.000$ in submissions. 14
-
-
lock screen / login bypass Total ntfs access control and file lock bypass for read from lowbox token sandbox Uefi partition writeable from low box token sandbox So many Escalation of privelegies I cannot keep track
Show this thread -
New conversation -
-
-
Why would you spend money you don't have yet?
-
People need to eat and have a roof over their head, geez. They likely assumed the bounty would be paid for the work and survived in the meantime by using credit cards to pay for food & rent.
End of conversation
New conversation -
-
-
Sorry to hear that but maybe you should consider getting a full time job. Bounty programs are unpredictable sometimes. If you are already in financial trouble, don’t add more legal trouble.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
This Tweet is unavailable.
-
no- they are not slow at claiming that when they do. only when paying. But the "dupes" are also lies- caught them twise in lying about it. Check and ask the person that gets a cve when they claim dupe
End of conversation
-
-
-
Am currently in need of the BitLocker one for work. DM me for details if you think you may be willing to do limited discloser to myself and another co-worker early. This is to restore access to a system we own, so no funny business to be worried about.
-
You are asking for access to a $20K bug
. At least that's what Microsoft is (un?-)willing to pay for it.https://www.microsoft.com/en-us/msrc/bounty-windows-insider-preview?rtc=1 …
End of conversation
New conversation -
-
-
Wow bro! Keep on it!
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.