You know who can’t afford to ban security researchers? Companies & govs who need to know about bugs researchers find, that’s who. Microsoft, which receives over 200,000 non-spam e-mail messages a year, made it a priority to improve relations with hackers. Bans make no sense. https://twitter.com/kenanistaken/status/1211751106189123590 …
-
Tweet je nedostupan.Prikaži ovu nit
-
Bans only make sense when the business model of the intermediary, a bug bounty platform, must use it to keep their own triage workforce costs down. Bans don’t help the customers of the bounty platform. It places the customer at risk of preventable 0 day drop by the researcher.
3 proslijeđena tweeta 27 korisnika označava da im se sviđaPrikaži ovu nit -
Even if no 0 day is dropped, the customer of bounty platforms now has to either manage the reports of the researcher outside the platform, or worse, never get more bugs from that finder again. So they will have outsourced a major piece of their security response only to weaken it
1 reply 0 proslijeđenih tweetova 20 korisnika označava da im se sviđaPrikaži ovu nit -
Bug bounty platforms were a great idea, but some got corrupted. To suit their own business model, triage is not done in the best interest of the customers or researchers. Both sides of this marketplace are being exploited in this model, but investors don’t care. We should care
5 proslijeđenih tweetova 30 korisnika označava da im se sviđaPrikaži ovu nit -
Hackers have been complaining about these bad platform practices, but as non-employees, their individual stories of frustration like this are lost in the noise of medium posts. Only when customers of bug bounty platforms push back to demand better triage, no bans, will it improve
1 reply 1 proslijeđeni tweet 21 korisnik označava da mu se sviđaPrikaži ovu nit -
Unfortunately, most customers who outsource vuln disclosure or bug bounties do it because they lack the in-house staff to manage things themselves. Many of my customers didn’t even know they *could* ask bounty platforms for better triage, or explicitly invite banned hackers back.
1 reply 0 proslijeđenih tweetova 19 korisnika označava da im se sviđaPrikaži ovu nit -
Folks about to take the bug bounty plunge w a bounty platform should at a minimum consider their own philosophy around why they are doing a bug bounty at all, & instruct their bounty platform vendor to run their program to match. If the goal is to protect users, no bans allowed.
1 reply 1 proslijeđeni tweet 18 korisnika označava da im se sviđaPrikaži ovu nit
If the goal is instead only to check a box that says “we take your security seriously, so we run a bug bounty,” then you can enjoy a smooth relationship w nobody except your bug bounty platform. Good researchers will eventually stop wasting their time trying to help protect you.
-
-
So my wish for you all in this bug hunting, bug triaging, bug resolving, bug bounty end of another buggy decade is this: That you all spend the next decade doing meaningful work that you’re proud of, & that security matures from broken business models to a sustainable ecosystem.pic.twitter.com/w0KccgVXrW
1 reply 4 proslijeđena tweeta 48 korisnika označava da im se sviđaPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.
. Hacker. MIT Sloan & Harvard Belfer visiting scholar.